Skip to main content
placeholder image

Private Set Intersection with Authorization over Outsourced Encrypted Datasets

Journal Article


Abstract


  • Thanks to its convenience and cost-savings feature, cloud computing ushers a new era. Yet its security and privacy issues must not be neglected. Private set intersection (PSI) is useful and important in many cloud computing applications, such as document similarity, genetic paternity and data mining. The cloud server performs intersection operations on two outsourced encrypted datasets of data owners. In the existing protocols, however, data owners cannot decide whether to use all or part of their encrypted data to compute the intersection, nor can they specify whom to compare with. In this paper, we introduce an enhanced notion of outsourced PSI, called authorized PSI (APSI), which supports flexible authorization and cross-type authorized comparison of datasets. To demonstrate this notion, we propose a concrete APSI protocol, and prove it to be secure in the random oracle model based on simple number-theoretic assumptions. Experimental results show that our APSI protocol has performance comparable with existing related outsourced PSI protocols.

Publication Date


  • 2021

Citation


  • Wang, Y., Huang, Q., Li, H., Xiao, M., Ma, S., & Susilo, W. (2021). Private Set Intersection with Authorization over Outsourced Encrypted Datasets. IEEE Transactions on Information Forensics and Security, 16, 4050-4062. doi:10.1109/TIFS.2021.3101059

Scopus Eid


  • 2-s2.0-85112609244

Start Page


  • 4050

End Page


  • 4062

Volume


  • 16

Abstract


  • Thanks to its convenience and cost-savings feature, cloud computing ushers a new era. Yet its security and privacy issues must not be neglected. Private set intersection (PSI) is useful and important in many cloud computing applications, such as document similarity, genetic paternity and data mining. The cloud server performs intersection operations on two outsourced encrypted datasets of data owners. In the existing protocols, however, data owners cannot decide whether to use all or part of their encrypted data to compute the intersection, nor can they specify whom to compare with. In this paper, we introduce an enhanced notion of outsourced PSI, called authorized PSI (APSI), which supports flexible authorization and cross-type authorized comparison of datasets. To demonstrate this notion, we propose a concrete APSI protocol, and prove it to be secure in the random oracle model based on simple number-theoretic assumptions. Experimental results show that our APSI protocol has performance comparable with existing related outsourced PSI protocols.

Publication Date


  • 2021

Citation


  • Wang, Y., Huang, Q., Li, H., Xiao, M., Ma, S., & Susilo, W. (2021). Private Set Intersection with Authorization over Outsourced Encrypted Datasets. IEEE Transactions on Information Forensics and Security, 16, 4050-4062. doi:10.1109/TIFS.2021.3101059

Scopus Eid


  • 2-s2.0-85112609244

Start Page


  • 4050

End Page


  • 4062

Volume


  • 16