• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

An Efficient PSI-CA Protocol Under the Malicious Model


Abstract

Private set intersection cardinality (PSI-CA) is a typical problem in the field of secure multi-party computation, which enables two parties calculate the cardinality of intersection securely without revealing any information about their sets. And it is suitable for private data protection scenarios where only the cardinality of the set intersection needs to be calculated. However, most of the currently available PSI-CA protocols only meet the security under the semi-honest model and can’t resist the malicious behaviors of participants. To solve the problems above, by the application of the variant of Elgamal cryptography and Bloom filter, we propose an efficient PSI-CA protocol with high security. We also present two new operations on Bloom filter called IBF and BIBF, which could further enhance the safety of private data. Using zero-knowledge proof to ensure the safety under malicious adversary model. Moreover, in order to minimize the error in the results caused by the false positive problem, we use Garbled Bloom Filter and key-value pair packing creatively and present an improved PSI-CA protocol. Through experimental comparison with several existing representative protocols, our protocol runs with linear time complexity and more excellent characters, which is more suitable for practical application scenarios.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
J. Liu, S. Cao, C. Wang, C. Liu, "An Efficient PSI-CA Protocol Under the Malicious Model," KSII Transactions on Internet and Information Systems, vol. 18, no. 3, pp. 720-737, 2024. DOI: 10.3837/tiis.2024.03.011.

[ACM Style]
Jingjie Liu, Suzhen Cao, Caifen Wang, and Chenxu Liu. 2024. An Efficient PSI-CA Protocol Under the Malicious Model. KSII Transactions on Internet and Information Systems, 18, 3, (2024), 720-737. DOI: 10.3837/tiis.2024.03.011.

[BibTeX Style]
@article{tiis:90678, title="An Efficient PSI-CA Protocol Under the Malicious Model", author="Jingjie Liu and Suzhen Cao and Caifen Wang and Chenxu Liu and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2024.03.011}, volume={18}, number={3}, year="2024", month={March}, pages={720-737}}