Private Membership Test Protocol with Low Communication Complexity
We introduce a practical method to perform private membership test. In this method, clients are able to test whether an item is in a set controlled by the server, without revealing their query items to the server. After executing the queries, the content of server’s set remains secret. We apply Bloom filter and Cuckoo filter in the membership test procedure. In order to achieve privacy properties, we present a novel protocol based on homomorphic encryption schemes. We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check a file hash value through the company’s database.
KeywordsPrivacy enhancing technologies Applied cryptography Private information retrieval Private membership test Homomorphic encryption Bloom filter Cuckoo filter
We thank the anonymous reviewers of NSS-2017 for their helpful comments. This work was supported in part by Tekes project “Cloud-assisted Security Services”.
- 4.Fan, B., Andersen, D.G., Kaminsky, M., Mitzenmacher, M.D.: Cuckoo filter: practically better than bloom. In: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, pp. 75–88. ACM (2014)Google Scholar
- 9.Chor, B., Gilboa, N., Naor, M.: Private information retrieval by keywords. CiteSeer (1997)Google Scholar
- 10.Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, pp. 364–373. IEEE (1997)Google Scholar
- 12.Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 803–815. Springer, Heidelberg (2005). doi: 10.1007/11523468_65 CrossRefGoogle Scholar
- 13.Pinkas, B., Schneider, T., Zohner, M.: Scalable private set intersection based on OT extension (2016). http://eprint.iacr.org/2016/930. (in submission)
- 14.Rabin, M.O.: How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive 2005, 187 (2005)Google Scholar
- 15.Tamrakar, S., Liu, J., Paverd, A., Ekberg, J.E., Pinkas, B., Asokan, N.: The circle game: Scalable private membership test using trusted hardware (2016). arXiv preprint: arXiv:1606.01655
- 16.Meskanen, T., Liu, J., Ramezanian, S., Niemi, V.: Private membership test for bloom filters. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 515–522. IEEE (2015)Google Scholar