fected than the other work. Still, for many parties, our
MPSI protocol becomes considerably more efficient.
In the following table we highlight the parameters
for which our MPSI protocol is more efficient than
Kolesnikov’s protocol. In short, for any domain size
d = 2
8
d = 2
10
n = 16 t ≥ 11 t ≥ 29
n = 128 t ≥ 19 t ≥ 40
d, number of elements n and collusion threshold `,
our MPSI protocol is more efficient than Kolesnikov
et al.’s protocol when the number of parties is large
enough. For a domain size of 2
8
elements, regardless
of the number of elements in each party’s set, the to-
tal runtime stays within 16 seconds for a group of 50
parties. For a larger domain of 2
10
elements, the total
runtime stays within 35 seconds for such a group. As
expected our protocol is especially efficient for small
domains d ≈ 2
8
and a low number of owned elements
n ≈ 16, where our runtime is significantly lower than
the other work, starting from 11 parties.
7 CONCLUSION
Multi-Party Private Set Intersection (MPSI) has been
proposed to enable several data owners to find the
common elements in their data sets without revealing
their data sets. However, the existing solutions suf-
fer from computation and communication costs when
the number of parties grows. In this paper, we have
proposed a new MPSI approach based on bit-set rep-
resentation and threshold Paillier PKE, which is effi-
cient for a large number of parties. We show theo-
retically and empirically that our proposed approach
considerably outperforms the existing MPSI solutions
when the number of parties increases.
ACKNOWLEDGEMENT
This work has been supported by the H2020 EU
funded project SECREDAS [GA #783119].
REFERENCES
Cao, X., Li, H., Dang, L., and Lin, Y. (2017). A two-party
privacy preserving set intersection protocol against
malicious users in cloud computing. Comput. Stand.
Interfaces, 54(P1):41–45.
Cheon, J. H., Jarecki, S., and Seo, J. H. (2012). Multi-Party
Privacy-Preserving Set Intersection with Quasi-Linear
Complexity. IEICE Transactions on Fundamentals of
Electronics Communications and Computer Sciences,
95(8):1366–1378.
Dong, C., Chen, L., and Wen, Z. (2013). When private set
intersection meets big data: An efficient and scalable
protocol. In the ACM SIGSAC Conference on Com-
puter and Communications Security, CCS ’13, page
789–800.
Fenske, E., Mani, A., Johnson, A., and Sherr, M. (2017).
Distributed measurement with private set-union cardi-
nality. In ACM SIGSAC Conference on Computer and
Communications Security, CCS, pages 2295–2312.
ACM.
Fouque, P., Poupard, G., and Stern, J. (2000). Sharing de-
cryption in the context of voting or lotteries. In Finan-
cial Cryptography, 4th International Conference, FC,
volume 1962 of Lecture Notes in Computer Science,
pages 90–104. Springer.
Fouque, P.-A. and Pointcheval, D. (2001). Threshold cryp-
tosystems secure against chosen-ciphertext attacks. In
Boyd, C., editor, Advances in Cryptology — ASI-
ACRYPT 2001, pages 351–368, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Goldreich, O. and Warning, A. (1998). Secure multi-party
computation.
Hazay, C. and Venkitasubramaniam, M. (2017). Scalable
multi-party private set-intersection. In Fehr, S., edi-
tor, Public-Key Cryptography (PKC), pages 175–203.
Springer Berlin Heidelberg.
Inbar, R., Omri, E., and Pinkas, B. (2018). Efficient scalable
multiparty private set-intersection via garbled bloom
filters. In 11th International Conference on Security
and Cryptography for Networks, pages 235–252.
Kerschbaum, F., Biswas, D., and de Hoogh, S. (2009). Per-
formance comparison of secure comparison protocols.
In Database and Expert Systems Applications, DEXA,
pages 133–136.
Kissner, L. and Song, D. X. (2005). Privacy-preserving set
operations. In Annual International Cryptology Con-
ference (CRYPTO), volume 3621 of Lecture Notes in
Computer Science, pages 241–257. Springer.
Kolesnikov, V., Matania, N., Pinkas, B., Rosulek, M., and
Trieu, N. (2017). Practical multi-party private set in-
tersection from symmetric-key techniques. In ACM
SIGSAC Conference on Computer and Communica-
tions Security, CCS, pages 1257–1272. ACM.
Miyaji, A. and Nishida, S. (2015). A scalable multiparty
private set intersection. In Network and System Secu-
rity Conference, NSS, volume 9408 of Lecture Notes
in Computer Science, pages 376–385. Springer.
Ruan, O., Wang, Z., Mi, J., and Zhang, M. (2019). New ap-
proach to set representation and practical private set-
intersection protocols. IEEE Access, 7:64897–64906.
Sheikhalishahi, M., Tillem, G., Erkin, Z., and Zannone, N.
(2019). Privacy-preserving multi-party access control.
In ACM Workshop on Privacy in the Electronic Soci-
ety, WPESCCS, pages 1–13.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
522