Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2019, Vol. 42 ›› Issue (2): 13-18.doi: 10.13190/j.jbupt.2018-236

• Papers • Previous Articles     Next Articles

Private Sets Intersection Protocols Based on Cloud Computing

ZHANG Jing1,2,3, LUO Shou-shan3, YANG Yi-xian1,3, XIN Yang3   

  1. 1. School of Computer and Information Technology, Benjing Jiaotong University, Beijing 100044, China;
    2. College of Computer Science and Technology, Henan Polytechnic University, Henan Jiaozuo 454000, China;
    3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2018-10-10 Online:2019-04-28 Published:2019-04-09

Abstract: A secure two-party set computation protocol based on cloud server outsourcing was proposed. The protocol solved the problem of the intersection of two sets and realizes the privacy protection of privacy sets of participants with the combination of the point value calculations of polynomial and Boneh encryption system. During protocol execution, the calculation of each participant was completely independent without any form of data interaction. It allows multiple participants to storage their private data to the cloud server independently without having to upload copies multiple times. The correctness, security and performance of protocol was proved, and the result of experimental analysis show that the calculation cost of the protocol is lower.

Key words: secure multi-party computation, private set intersection, cloud outsourcing

CLC Number: