A Cloud-Assisted Multi-Party Private Set Intersection Protocol

Authors

  • Yanru Zeng College of Software, Henan Polytechnic University, Jiaozuo, China
  • Yufeng Wang College of Software, Henan Polytechnic University, Jiaozuo, China

DOI:

https://doi.org/10.54097/dbmtyq08

Keywords:

Privacy set intersection, Cloud-assisted, Inadvertent key-value pair storage, Pseudorandom function, Privacy security

Abstract

In cloud environments, addressing the optimization problem between security and computational and communication overhead in multi-party private set intersection protocols. This paper proposes a multi-party Private Set Intersection protocol utilizing cloud server-assisted computation, enhancing the protocol's scalability and efficiency while safeguarding data privacy and security. This protocol is designed under the semi-honest security model, Participants process the elements of the set using keyed pseudorandom functions and hash functions, and introduce a pseudorandom generator to randomize participant information. This is combined with an oblivious key-value pair storage structure to complete data encoding, enabling cloud servers to determine intersections solely based on the encoded results, without access to any raw set information from participating parties. Theoretical analysis demonstrates that the proposed protocol correctly implements the computation of the intersection of multiple sets and satisfies privacy protection requirements under the specified security model.

Downloads

Download data is not yet available.

References

[1] Morales Daniel, Isaac Agudo, and Javier Lopez. “Private set intersection: A systematic literature review”, Computer Science Review, Vol. 49, pp. 100567, 2023. https://doi.org/10.1016/j.cosrev.2023.100567

[2] Lai Chengzhe, Hanyue Zhang, Rongxing Lu, and Dong Zheng. “Privacy-preserving medical data sharing scheme based on two-party cloud-assisted PSI”, IEEE Internet of Things Journal, Vol. 11, No. 9, pp. 15855-15868, 2024. https://doi.org/10.1109/jiot.2024.3350029

[3] Chen Yuchi, and Kuan-Chun Huang. “JEDI: joint and effective privacy preserving outsourced set intersection and data integration protocols”, IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 4504-4514, 2023. https://doi.org/10.1109/tifs.2023.3295941

[4] Kavousi Alireza, Javad Mohajeri, and Mahmoud Salmasizadeh. “Efficient scalable multi-party private set intersection using oblivious PRF”, In: International Workshop on Security and Trust Management, pp. 81-99, Cham: Springer International Publishing, 2021. https://doi.org/10.1007/978-3-030-91859-0_5

[5] Abadi Aydin, Sotirios Terzis, Roberto Metere, and Changyu Dong. "Efficient delegated private set intersection on outsourced private datasets." IEEE Transactions on Dependable and Secure C omputing, Vol. 16, No. 4, pp. 608-624, 2017. https://doi.org/10.1109/tdsc.2017.2708710

[6] Fan Cunqun, Peiheng Jia, Manyun Lin, Lan Wei, Peng Guo, Xiangang Zhao, and Ximeng Liu. "Cloud-assisted private set intersection via multi-key fully homomorphic encryption." Mathematics, Vol. 11, No. 8, pp. 1784, 2023. https://doi.org/10.3390/math11081784

[7] Jolfaei Amirhossein Adavoudi, Hamid Mala, and Maryam Zarezadeh. "EO-PSI-CA: Efficient outsourced private set intersection cardinality." Journal of Information Security and Applications, Vol. 65, pp. 102996, 2022. https://doi.org/10.1016/j.jisa.2021.102996

[8] Banerjee Abhishek, Chris Peikert, and Alon Rosen. "Pseudorandom functions and lattices." In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 719-737. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. https://doi.org/10.1007/978-3-642-29011-4_42

[9] Damgård Ivan Bjerre. "A design principle for hash functions." In Conference on the Theory and Application of Cryptology, pp. 416-427. New York, NY: Springer New York, 1989. https://doi.org/10.1007/0-387-34805-0_39

[10] Håstad Johan, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. "A pseudorandom generator from any one-way function." SIAM Journal on Computing, Vol. 28, No. 4, pp. 1364-1396, 1999. https://doi.org/10.1137/s0097539793244708

[11] Pinkas Benny, Mike Rosulek, Ni Trieu, and Avishay Yanai. "PSI from PaXoS: Fast, malicious private set intersection." In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 739-767. Cham: Springer International Publishing, 2020. https://doi.org/10.1007/978-3-030-45724-2_25.

Downloads

Published

2026-02-24

Issue

Section

Articles

How to Cite

Zeng, Y., & Wang, Y. (2026). A Cloud-Assisted Multi-Party Private Set Intersection Protocol. International Journal of Advanced Engineering and Technology Research, 1(1), 1-9. https://doi.org/10.54097/dbmtyq08