4.6 Article

A new efficient authorized private set intersection protocol from Schnorr signature and its applications

出版社

SPRINGER
DOI: 10.1007/s10586-017-0940-2

关键词

Information sharing; Authorized private set intersection; Linear complexity; Cloud services

资金

  1. National Natural Science Foundation of China [61572028, 61472091, 61300204]
  2. Project of Science and Technology of Guangdong [2016B010125002, 2015A030313630, S2013020011913, 2014A030313439]
  3. Natural Science Foundation of Guangdong Province for Distinguished Young Scholars [2014A030306020]
  4. Guangzhou Scholars Project for Universities of Guangzhou [1201561613]
  5. Science and Technology Planning Project of Guangdong province [2015B010129015]
  6. Ministry of education of Humanities and Social Science Project [15YJCZH029]
  7. Social Science Planning Project of Guangzhou City [2016gzyb25]
  8. Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security

向作者/读者索取更多资源

Private set intersection (PSI) has been proposed to achieve sharing sensitive information with privacy, which allows two participators to compute the intersection of their private sets without revealing any other information. Authorized private set intersection (APSI) is a variant of PSI such that APSI requires client sets for intersection must be authorized. Although many schemes have been proposed for linear optimization in the existing APSI publications, how to linearly optimize the APSI protocol based on the Schnorr signature has not been proposed yet. In this paper, we propose a new efficient APSI protocol with linear complexity (denoted by LC-APSI) from the Schnorr signature. LC-APSI is proven secure in the random oracle model by assuming the intractability of the gap Diffie-Hellman problem. Apart from the existed efficient APSI protocols based on RSA and IBE, the new proposal fills up the technical extensions and applications of APSI. In particular, our proposal on sharing sensitive information is also instantiatedwhich can be used to the practical applications in cloud computing or outsourced data sharing.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据