10,670 research outputs found

    Scalable Multi-Party Private Set-Intersection

    Get PDF
    In this work we study the problem of private set-intersection in the multi-party setting and design two protocols with the following improvements compared to prior work. First, our protocols are designed in the so-called star network topology, where a designated party communicates with everyone else, and take a new approach of leveraging the 2PC protocol of [FreedmanNP04]. This approach minimizes the usage of a broadcast channel, where our semi-honest protocol does not make any use of such a channel and all communication is via point-to-point channels. In addition, the communication complexity of our protocols scales with the number of parties. More concretely, (1) our first semi-honest secure protocol implies communication complexity that is linear in the input sizes, namely O((∑i=1nmi)⋅κ)O((\sum_{i=1}^n m_i)\cdot\kappa) bits of communication where κ\kappa is the security parameter and mim_i is the size of PiP_i\u27s input set, whereas overall computational overhead is quadratic in the input sizes only for a designated party, and linear for the rest. We further reduce this overhead by employing two types of hashing schemes. (2) Our second protocol is proven secure in the malicious setting. This protocol induces communication complexity O((n^2 + nm_\maxx + nm_\minn\log m_\maxx)\kappa) bits of communication where m_\minn (resp. m_\maxx) is the minimum (resp. maximum) over all input sets sizes and nn is the number of parties

    Secure and Efficient Multiparty Private Set Intersection Cardinality

    Get PDF
    The article of record as published may be found at http://dx.doi.org/10.3934/amc.2020071In the field of privacy preserving protocols, Private Set Intersection (PSI) plays an important role. In most of the cases, PSI allows two parties to securely determine the intersection of their private input sets, and no other information. In this paper, employing a Bloom filter, we propose a Multiparty Private Set Intersection Cardinality (MPSI-CA), where the number of participants in PSI is not limited to two. The security of our scheme is achieved in the standard model under the Decisional Diffie-Hellman (DDH) assumption against semi-honest adversaries. Our scheme is flexible in the sense that set size of one participant is independent from that of the others. We consider the number of modular exponentiations in order to determine computational complexity. In our construction, communication and computation overheads of each participant is O(v max k) except that the complexity of the designated party is O(v1), where v max is the maximum set size, v1 denotes the set size of the designated party and k is a security parameter. Particularly, our MSPI-CA is the first that incurs linear complexity in terms of set size, namely O(nv max k), where n is the number of participants. Further, we extend our MPSI-CA to MPSI retaining all the security attributes and other properties. As far as we are aware of, there is no other MPSI so far where individual computational cost of each participant is independent of the number of participants. Unlike MPSI-CA, our MPSI does not require any kind of broadcast channel as it uses star network topology in the sense that a designated party communicates with everyone else

    Private Set Intersection with Linear Communication from General Assumptions

    Get PDF
    This work presents a hashing-based algorithm for Private Set Intersection (PSI) in the honest-but-curious setting. The protocol is generic, modular and provides both asymptotic and concrete efficiency improvements over existing PSI protocols. If each player has mm elements, our scheme requires only O(m \secpar) communication between the parties, where \secpar is a security parameter. Our protocol builds on the hashing-based PSI protocol of Pinkas et al. (USENIX 2014, USENIX 2015), but we replace one of the sub-protocols (handling the cuckoo ``stash\u27\u27) with a special-purpose PSI protocol that is optimized for comparing sets of unbalanced size. This brings the asymptotic communication complexity of the overall protocol down from \omega(m \secpar) to O(m\secpar), and provides concrete performance improvements (10-15\% reduction in communication costs) over Kolesnikov et al. (CCS 2016) under real-world parameter choices. Our protocol is simple, generic and benefits from the permutation-hashing optimizations of Pinkas et al. (USENIX 2015) and the Batched, Relaxed Oblivious Pseudo Random Functions of Kolesnikov et al. (CCS 2016)

    Forum Session at the First International Conference on Service Oriented Computing (ICSOC03)

    Get PDF
    The First International Conference on Service Oriented Computing (ICSOC) was held in Trento, December 15-18, 2003. The focus of the conference ---Service Oriented Computing (SOC)--- is the new emerging paradigm for distributed computing and e-business processing that has evolved from object-oriented and component computing to enable building agile networks of collaborating business applications distributed within and across organizational boundaries. Of the 181 papers submitted to the ICSOC conference, 10 were selected for the forum session which took place on December the 16th, 2003. The papers were chosen based on their technical quality, originality, relevance to SOC and for their nature of being best suited for a poster presentation or a demonstration. This technical report contains the 10 papers presented during the forum session at the ICSOC conference. In particular, the last two papers in the report ere submitted as industrial papers

    Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF

    Get PDF
    In this paper, we present a concretely efficient protocol for private set intersection (PSI) in the multi-party setting using oblivious pseudorandom function (OPRF). In fact, we generalize the approach used in the work of Chase and Miao [CRYPTO 2020] towards deploying a lightweight multi-point OPRF construction for two-party PSI. Our protocol only includes oblivious transfer (OT) extension and garbled Bloom filter as its main ingredients and avoids computationally expensive operations. From a communication pattern perspective, the protocol consists of two types of interactions. The first type is performed over a star-like communication graph in which one designated party interacts with all other parties via performing OTs as the sender. Besides, parties communicate through a path-like communication graph that involves sending a garbled Bloom filter from the first party to its neighboring party following the last one. This design makes our protocol to be highly scalable due to the independence of each party\u27s complexity from the number of participating parties and thus causes a communication and computation complexities of O(nλk)O(n\lambda k), where nn is the set size, kk is the number of hash functions, and λ\lambda is the security parameter. Moreover, the asymptotic complexity of the designated party is O(tnλ)O(tn\lambda) which linearly scales with the number of parties tt. We prove security of the proposed protocol against semi-honest adversaries

    Context in leadership: A comparative case analysis of female public and private sector leaders

    Full text link
    Public higher education institutions today are fiercely competitive social, economic, and technologic powerhouses with complex missions, structures, and issues. They help fuel business and economic development through their direct impact on growth and spending and through the creation of new jobs and businesses, and have become critical sources of scientific talent, research data, and technological innovations for both the public and the private sector; In comparison, private sector enterprises today function in an environment where knowledge is economic capital and success is driven by highly skilled professional employees working in innovative organizational units to find, use, create, and transform knowledge and information; all in the face of a greater public expectation of increased fairness, responsiveness, and accountability; The purpose of this study was to explore the impact of context on individual leader perspectives of the leadership experience. The issues identified and delineated by the participants of the American Council on Education\u27s Fourth Women Presidents\u27 Summit provided the rationale for the study. Through purposeful sampling, three private enterprise business sector and three public research university leaders, meeting the criteria of this exploratory comparative case study, were identified. The data were evaluated using the theories of Person-organization fit, Schneider\u27s (1987) Attraction-Selection-Attrition, and Mintzberg\u27s (1981) five organization configurations as analytical frameworks; The data and analytical frameworks confirmed and validated the themes of engagement, productivity, and accountability and the personal, positional, and public domains that emerged. The findings of this research indicate that the environment in which these leaders operate did affect their perception of the leadership experience. As well, the lack of consensus among the leaders by sector and the spectrum of the leaders\u27 perceptions of their experiences provide further evidence that the specific context of their influence and control is significant; The findings of this study also suggest that there are particular indicators associated with the themes and domains of leadership that can be applied to assess the impact of context. The researcher developed a model and presents evidence rooted in an unanticipated finding of the study that advances a hypothesis about contextual accord, or lack thereof, between leader and environment

    TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing

    Get PDF
    Ridesharing is revolutionizing the transportation industry in many countries. Yet, the state of the art is based on heavily centralized services and platforms, where the service providers have full possession of the users’ location data. Recently, researchers have started addressing the challenge of enabling privacy-preserving ridesharing. The initial proposals, however, have shortcomings, as some rely on a central party, some incur high performance penalties, and most do not consider time preferences for ridesharing. TOPPool encompasses ridesharing based on the proximity of end-points of a ride as well as partial itinerary overlaps. To achieve the latter, we propose a simple yet powerful reduction to a private set intersection on trips represented as sets of consecutive road segments. We show that TOPPool includes time preferences while preserving privacy and without relying on a third party. We evaluate our approach on real-world data from the New York’s Taxi & Limousine Commission. Our experiments demonstrate that TOPPool is superior in performance over the prior work: our intersection-based itinerary matching runs in less than 0.3 seconds for reasonable trip length, in contrast, on the same set of trips prior work takes up to 10 hours

    On the Integration of Unmanned Aerial Vehicles into Public Airspace

    Get PDF
    Unmanned Aerial Vehicles will soon be integrated in the airspace and start serving us in various capacities such as package delivery, surveillance, search and rescue missions, inspection of infrastructure, precision agriculture, and cinematography. In this thesis, motivated by the challenges this new era brings about, we design a layered architecture called Internet of Drones (IoD). In this architecture, we propose a structure for the traffic in the airspace as well as the interaction between the components of our system such as unmanned aerial vehicles and service providers. We envision the minimal features that need to be implemented in various layers of the architecture, both on the Unmanned Aerial Vehicle (UAV)'s side and on the service providers' side. We compare and contrast various approaches in three existing networks, namely the Internet, the cellular network, and the air traffic control network and discuss how they relate to IoD. As a tool to aid in enabling integration of drones in the airspace, we create a traffic flow model. This model will assign velocities to drones according to the traffic conditions in a stable way as well as help to study the formation of congestion in the airspace. We take the novel problem posed by the 3D nature of UAV flights as opposed to the 2D nature of road vehicles movements and create a fitting traffic flow model. In this model, instead of structuring our model in terms of roads and lanes as is customary for ground vehicles, we structure it in terms of channels, density and capacities. The congestion is formulated as the perceived density given the capacity and the velocity of vehicles will be set accordingly. This view removes the need for a lane changing model and its complexity which we believe should be abstracted away even for the ground vehicles as it is not fundamentally related to the longitudinal movements of vehicles. Our model uses a scalar capacity parameter and can exhibit both passing and blocking behaviors. Furthermore, our model can be solved analytically in the blocking regime and piece-wise analytically solved when in the passing regime. Finally, it is not possible to integrate UAVs into the airspace without some mechanism for coordination or in other words scheduling. We define a new scheduling problem in this regard that we call Vehicle Scheduling Problem (VSP). We prove NP-hardness for all the commonly used objective functions in the context of Job Shop Scheduling Problem (JSP). Then for the number of missed deadlines as our objective function, we give a Mixed Integer Programming (MIP) formulation of VSP. We design a heuristic algorithm and compare the quality of the schedules created for small instances with the exact solution to the MIP instance. For larger instances, these comparisons are made with a baseline algorithm
    • …
    corecore