Loading...

Improving the Security of Private Set Intersectio

Mahdavi Oliaiy, Mahdi | 2017

623 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 50384 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza; Mohajeri, Javad
  7. Abstract:
  8. In some applications in the field of information technology such as social networks and medical databases in different hospitals, sometimes an entity needs to calculate the extent of its sharing of information documents with other institutions. Access to one entity's information is not possible due to the confidentiality of users' information. Therefore, in order to calculate common documents, users should be able to do so without revealing their private information. Therefore, it is required protocols such that can only obtain the shared information between two mentioned entities, while preserving the confidentiality of uncommon information. The schemes that meet the above objectives are referred to as the Private Set Intersections protocols. In this thesis, we introduce, categorize and evaluate several protocols in this field. Recently, the approach for exploiting cloud servers has been realized to facilitate the calculation of reciprocal relationships among institutions. Also, in this thesis, some of the designs presented in the cloud computing model have been studied. For this aim, two scheme for the constructions of two outsourced private set intersection schemes presented. The proposed schemes in compare with the existing scheme have gained a better performance and more security. Especially, in the first design, with the advantage of the El-Gamal cryptosystem, we propose a secure and efficient pairing-free outsourced private set intersection scheme. Therefore, as the use of bilinear pairing is omitted in our scheme, we have achieved to a more efficient scheme with significantly lower time execution. Typically, the execution time of the bilinear pairing is more than modular exponentiation and our scheme basically designed by computing modular exponentiations. Moreover, in this scheme the users also are able to verify the performance of the cloud service provider. In this second scheme, we have presented two cryptanalyses on the Abadi et al.’s proposed private set intersection scheme which are refer to the man-in-the-middle attack and the collusion attack. After that, we improve their scheme in such away to improve the security of their scheme against the aforementioned attacks. The improvement is applied while the overall performance remained unchanged
  9. Keywords:
  10. Privacy Preserving ; Cloud Computing ; Cryptography ; Protocol ; Resource Sharing ; Private Set Intersections

 Digital Object List

 Bookmark

No TOC