TY - GEN
T1 - Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets
AU - Mayer, Daniel A.
AU - Teubert, Dominik
AU - Wetzel, Susanne
AU - Meyer, Ulrike
PY - 2011
Y1 - 2011
N2 - Recently, new protocols were proposed which allow two parties to reconcile their ordered input sets in a fair and privacy-preserving manner. In this paper we present the design and implementation of these protocols on different platforms and extensively study their performance. In particular, we present the design of a library for privacy-preserving reconciliation protocols and provide details on an efficient C++ implementation of this design. Furthermore, we present details on the implementation of a privacy-preserving iPhone application built on top of this library. The performance of both the library and the iPhone application are comprehensively analyzed. Our performance tests show that it is possible to efficiently implement private set intersection as a generic component on a desktop computer. Furthermore, the tests confirm the theoretically determined quadratic worst-case behavior of the privacy-preserving reconciliation protocols on the desktop as well as the iPhone platform. The main result of the performance analysis is that the protocols show linear runtime performance for average-case inputs. This is a significant improvement over the worst-case and is key for making these protocols highly viable for a wider range of applications in practice.
AB - Recently, new protocols were proposed which allow two parties to reconcile their ordered input sets in a fair and privacy-preserving manner. In this paper we present the design and implementation of these protocols on different platforms and extensively study their performance. In particular, we present the design of a library for privacy-preserving reconciliation protocols and provide details on an efficient C++ implementation of this design. Furthermore, we present details on the implementation of a privacy-preserving iPhone application built on top of this library. The performance of both the library and the iPhone application are comprehensively analyzed. Our performance tests show that it is possible to efficiently implement private set intersection as a generic component on a desktop computer. Furthermore, the tests confirm the theoretically determined quadratic worst-case behavior of the privacy-preserving reconciliation protocols on the desktop as well as the iPhone platform. The main result of the performance analysis is that the protocols show linear runtime performance for average-case inputs. This is a significant improvement over the worst-case and is key for making these protocols highly viable for a wider range of applications in practice.
KW - Cryptographic protocol
KW - IPhone
KW - Multi-party computation
KW - Ordered sets
KW - Performance
KW - Privacy
KW - Private set intersection
UR - http://www.scopus.com/inward/record.url?scp=79952859444&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79952859444&partnerID=8YFLogxK
U2 - 10.1145/1943513.1943529
DO - 10.1145/1943513.1943529
M3 - Conference contribution
AN - SCOPUS:79952859444
SN - 9781450304665
T3 - CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
SP - 109
EP - 120
BT - CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
T2 - 1st ACM Conference on Data and Application Security and Privacy, CODASPY'11
Y2 - 21 February 2011 through 23 February 2011
ER -