ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2020, Vol. 57 ›› Issue (10): 2221-2231.doi: 10.7544/issn1000-1239.2020.20200444

Special Issue: 2020密码学与数据隐私保护研究专题

Previous Articles     Next Articles

Privacy-Preserving Statistics Protocol for Set-Based Computation

Song Xiangfu1, Gai Min2, Zhao Shengnan1, Jiang Han2   

  1. 1(School of Computer Science and Technology, Shandong University, Jinan 250101);2(School of Software, Shandong University, Jinan 250101)
  • Online:2020-10-01
  • Supported by: 
    This work was supported by the National Natural Science Foundation of China (61632020, 61572294).

Abstract: Mining valuable information from high volume of data, which can be used to guide real-world business and management, has been an important demand in the era of big data. In reality, data is usually distributed among different entities. A common way for data analysis is to let a trusted party to perform algorithms on the collected data. However, this trivial approach not only puts data owners privacy at risk, but also may bring with potential data breach issued by some outside attackers. With more and more law and regulation on data security and privacy coming out, there are more requirements for the whole life of data, which includes privacy-preserving data storing, processing and so on. It has been a common sense to leverage privacy-preserving techniques to protect sensitive data while still enabling participants to mine value from the whole dataset contributed from each party. Among those techniques, private set intersection (PSI) attracts more and more attention as it can be applied in many real-world scenarios. However, most PSI protocols only focus on computing the intersection itself, and in many cases the participants may also want to compute a function of the intersection, e.g., the cardinality of intersection or intersection sum, and even more general functions. To this end, a several of protocols are designed in this paper. By these protocols, one can privately compute intersection cardinality or intersection sum without leaking the elements of the intersection. Notably, these protocols, without resorting to homomorphic encryption or general circuit-based technique, can complete needed computation by only leveraging oblivious transfer. Since oblivious transfer can be efficiently extended by current highly efficient oblivious transfer extension protocols, this means these protocols are highly efficient in computation complexity. In addition, communication complexity of the protocols is also optimized by leveraging existing hashing technique. The protocols can be formally proven secure under semi-honest adversary, and complexity analysis is also provided in the paper.

Key words: private set intersection, privacy-preserving, statistics, oblivious transfer, secure computation, cardinality of intersection, intersection sum

CLC Number: