Private Two-Party Set Intersection Protocol in Rational
Model
Atsuko Miyaji1 and Mohammad Shahriar Rahman2*
1School of
Information Science,
Japan Advanced Institute of Science and Technology,
Ishikawa, Japan.
miyaji@jaist.ac.jp
2Department of
Computer Science and Engineering,
University of Asia Pacific,
Dhaka, Bangladesh.
shahriar.rahman@uap-bd.edu
Abstract
Many data mining algorithms use privacy preserving set
intersection operations. Private set operations
have considered semi-honest and malicious adversarial
models in cryptographic settings.
Protocols in semi-honest model, requiring light
computations, provide weak security. Protocols in
malicious model guarantee strong security at the price of
expensive computations like homomorphic
encryption and zero-knowledge proof. However, practical
implementations require robust and
efficient protocols. In this paper, we build efficient
and private set intersection avoiding the use of
expensive tools like homomorphic encryption and
zero-knowledge proof. Our proposed set intersection
protocol is constructed in game-theoretic model. In our
model, the parties are viewed as rational
whereby they are assumed (only) to act in their self-interest.
Our protocol satisfies computational
Nash equilibrium.
Keywords: Privacy, Set Intersection, Rational Cryptography,
Computational Nash Equilibrium
*Corresponding author: Dept of Computer Science and
Engineering, University of Asia Pacific,
House 52/1, Road 4/A, Dhanmondi, Dhaka-1209, Bangladesh,
Tel: +88-01742092172
Journal of Internet
Services and Information Security (JISIS), 2(1/2):
93-104, February 2012 [pdf]