JAIST Repository >
b. 情報科学研究科・情報科学系 >
b11. 会議発表論文・発表資料等 >
b11-1. 会議発表論文・発表資料 >

このアイテムの引用には次の識別子を使用してください: http://hdl.handle.net/10119/11617

タイトル: Private Multiparty Set Intersection Protocol in Rational Model
著者: Emura, Keita
Miyaji, Atsuko
Rahman, Mohammad Shahriar
キーワード: Set intersection
Game theory
Computational Strict Nash equilibrium
Commutative Encryption
発行日: 2013-07
出版者: Institute of Electrical and Electronics Engineers (IEEE)
誌名: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
開始ページ: 431
終了ページ: 438
DOI: 10.1109/TrustCom.2013.54
抄録: Privacy-preserving set intersection protocol is desirable for many practical applications. Malicious and semihonest adversarial models in cryptographic settings have been considered mostly to design such protocols for privacy-preserving set intersection. In a semi-honest or malicious model an adversary is assumed to follow or arbitrarily deviate from the protocol, respectively. Protocols in semi-honest model can utilize cheaper cryptographic primitives, but that comes with a cost of weaker security. On the other hand, strong security is guaranteed by the malicious model whereby expensive cyptographic primitives are required. However, achieving a desired level of privacy with efficient computation is what we need for practical implementations. In this paper, we address the multiparty private set intersection problem using simple cryptographic primitives, in which each of the N parties learns no elements other than the intersection of their N private datasets. The private set intersection is constructed in game-theoretic model, where instead of being semi-honest or malicious the parties are viewed as rational and are assumed (only) to act in their own self-interest. We consider both single player deviation and coalitions, and show that our protocol satisfies computational strict Nash equilibrium.
Rights: This is the author's version of the work. Copyright (C) 2013 IEEE. 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2013, 431-438. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
URI: http://hdl.handle.net/10119/11617
資料タイプ: author
出現コレクション:b11-1. 会議発表論文・発表資料 (Conference Papers)

このアイテムのファイル:

ファイル 記述 サイズ形式
19285.pdf257KbAdobe PDF見る/開く

当システムに保管されているアイテムはすべて著作権により保護されています。

 


お問い合わせ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係