JAIST Repository >
b. 情報科学研究科・情報科学系 >
b11. 会議発表論文・発表資料等 >
b11-1. 会議発表論文・発表資料 >
このアイテムの引用には次の識別子を使用してください:
http://hdl.handle.net/10119/11617
|
タイトル: | Private Multiparty Set Intersection Protocol in Rational Model |
著者: | Emura, Keita Miyaji, Atsuko Rahman, Mohammad Shahriar |
キーワード: | Set intersection Game theory Computational Strict Nash equilibrium Commutative Encryption |
発行日: | 2013-07 |
出版者: | Institute of Electrical and Electronics Engineers (IEEE) |
誌名: | 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) |
開始ページ: | 431 |
終了ページ: | 438 |
DOI: | 10.1109/TrustCom.2013.54 |
抄録: | Privacy-preserving set intersection protocol is desirable for many practical applications. Malicious and semihonest adversarial models in cryptographic settings have been considered mostly to design such protocols for privacy-preserving set intersection. In a semi-honest or malicious model an adversary is assumed to follow or arbitrarily deviate from the protocol, respectively. Protocols in semi-honest model can utilize cheaper cryptographic primitives, but that comes with a cost of weaker security. On the other hand, strong security is guaranteed by the malicious model whereby expensive cyptographic primitives are required. However, achieving a desired level of privacy with efficient computation is what we need for practical implementations. In this paper, we address the multiparty private set intersection problem using simple cryptographic primitives, in which each of the N parties learns no elements other than the intersection of their N private datasets. The private set intersection is constructed in game-theoretic model, where instead of being semi-honest or malicious the parties are viewed as rational and are assumed (only) to act in their own self-interest. We consider both single player deviation and coalitions, and show that our protocol satisfies computational strict Nash equilibrium. |
Rights: | This is the author's version of the work. Copyright (C) 2013 IEEE. 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2013, 431-438. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
URI: | http://hdl.handle.net/10119/11617 |
資料タイプ: | author |
出現コレクション: | b11-1. 会議発表論文・発表資料 (Conference Papers)
|
このアイテムのファイル:
ファイル |
記述 |
サイズ | 形式 |
19285.pdf | | 257Kb | Adobe PDF | 見る/開く |
|
当システムに保管されているアイテムはすべて著作権により保護されています。
|