@inbook{a837099950bc457fada621962bae602f,
title = "Efficient disjointness tests for private datasets",
abstract = "We present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the cardinality of the intersection. More specifically, it discloses its lower bound. By using the Lagrange interpolation we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. The protocol applies a verification test to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are first ones that have been designed without a generic secure function evaluation. More importantly, they are the most efficient protocols for private disjointness tests for the malicious adversary case.",
author = "Qingsong Ye and Huaxiong Wang and Josef Pieprzyk and Zhang, {Xian Mo}",
year = "2008",
doi = "10.1007/978-3-540-70500-0_12",
language = "English",
isbn = "9783540699712",
series = "Lecture Notes in Computer Science",
publisher = "Springer, Springer Nature",
pages = "155--169",
editor = "Yi Mu and Willy Susilo and Jennifer Seberry",
booktitle = "Information Security and Privacy",
address = "United States",
note = "13th Australasian Conference on Information Security and Privacy, ACISP 2008 ; Conference date: 07-07-2008 Through 09-07-2008",
}