Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases

Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Peeyush Gupta, Dhrubajyoti Ghosh

Research output: Contribution to journalArticlepeer-review

Abstract

Private set computation over multi-owner databases is an important problem with many applications - the most well studied of which is private set intersection (PSI). This article proposes Prism, a secret-sharing based approach to compute private set operations (i.e., intersection and union, as well as aggregates such as count, sum, average, maximum, minimum, and median) over outsourced databases belonging to multiple owners. Prism enables data owners to pre-load the data onto non-colluding servers and exploits the additive and multiplicative properties of secret-shares to compute the above-listed operations. Prism takes (at most) two rounds of communication between non-colluding servers (storing the secret-shares) and the querier for executing the above-mentioned operations, resulting in a very efficient implementation. Prism also supports result verification techniques for each operation to detect malicious adversaries. Experimental results show that Prism scales both in terms of the number of data owners and database sizes, to which prior approaches do not scale.

Original languageEnglish (US)
Pages (from-to)1355-1371
Number of pages17
JournalIEEE Transactions on Dependable and Secure Computing
Volume21
Issue number3
DOIs
StatePublished - May 1 2024

All Science Journal Classification (ASJC) codes

  • General Computer Science
  • Electrical and Electronic Engineering

Keywords

  • Additive sharing
  • aggregation operation
  • computation and data privacy
  • data and computation outsourcing
  • multi-party computation
  • private set intersection
  • private set union
  • result verification
  • set cardinality
  • shamir's secret-sharing

Fingerprint

Dive into the research topics of 'Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases'. Together they form a unique fingerprint.

Cite this