
doi: 10.1002/sec.988
AbstractWe introduce the public key encryption with keywords search into the problem of secure two‐party computation and obtain a novel approach to accomplish private set intersection (PSI), which uses the public key encryption with keywords search as the basic tool. The public key encryption with keywords search scheme we adopt does not need the expensive MapToPoint operation, thus the computation complexity can be reduced significantly compared with other PSI schemes, which also obtain linear computation complexity. We aim to achieve PSI in computationally asymmetric settings, which can be instantiated by cloud computing. Our protocol satisfies the privacy with respect to semi‐honest behavior, and the client only needs to compute m multiplications, m hashes, and one modular exponentiation to obtain the intersection, where m denotes the cardinality of the client's input set. Copyright © 2014 John Wiley & Sons, Ltd.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 9 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
