Abstract:Secure multiparty computation is one focus in the international cryptographic community in recent years.The private computation of multisets is also of great practical significance.In order to privately compute on multisets,we first propose two new encoding schemes.Then based on Paillier probabilistic encryption algorithm,we design three simple and efficient secure two party protocols to compute the intersection,the union and the summation of two private multisets.We prove that they are secure in the semi-honest model.We also analyze the computational complexities and communication complexities of the protocols and test the efficiency on a PC.The test result shows that our protocols are efficient.
[1] Freedman M J,Hazay C,Nissim K,et al.Efficient set intersection with simulation-based security[J].Journal of Cryptology,2016,29(1):115-155.
[2] Cramer R,Damgard I B,Nielsen J B.Secure Multiparty Computation[M].London:Cambridge University Press,2015.
[3] Yao A C.Protocols for secure computations[A].The 23th IEEE Symposiumon Foundations of Computer Science[C].Chicago,Illinois,USA,1982.160-164.
[4] Yasin S,Haseeb K,Qureshi R J.Cryptography based e-commerce security:a review[J].International Journal of Computer Science Issues,2012,9(2):132-137.
[5] Hirofumi M,Noritaka S,Hiromi M.A proposal of profit sharing method for secure multiparty computation[J].International Journal of Innovative Computing Information and Control,2018,14(2):727-735.
[6] Kissner L,Song D.Privacy-preserving set operations[A].The 25th Annual International Cryptology Conference[C].Santa Barbara,California,USA,2005.241-257.
[7] Blanton M,Aguiar E.Private and oblivious set and multiset operations[J].International Journal of Information Security,2016,15(4):493-518.
[8] 窦家维,刘旭红,周素芳,等.高效的集合安全多方计算协议及应用[J].计算机学报,2018,41(8):1844-1860. Dou Jia-wei,Liu Xu-hong,Zhou Su-fang,et al.Efficient secure multiparty set operations protocols and their application[J].Chinese Journal of Computers,2018,41(8):1844-1860.(in Chinese)
[9] Goldreich O.The Fundamental of Cryptography:Basic Applications[M].London:Cambridge University Press,2004.599-764.
[10] Paillier P.Public-key cryptosystems based on composite degree residuosity classes[A].International Conference on the Theory and Application of Cryptographic Techniques[C].Prague,Czech Republic,1999.223-238.