Multi-party Private Set Intersection

Papers

  • Practical Multi-party Private Set Intersection from Symmetric-Key Techniques. Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, and Ni Trieu. 2017
  • A Scalable Multiparty Private Set Intersection. Atsuko Miyaji, and Shohei Nishida. 2015
  • Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters. Roi Inbar, Eran Omri, and Benny Pinkas. 2018
  • An Algebraic Approach to Maliciously Secure Private Set Intersection. Satrajit Ghosh, and Tobias Nilges. 2017
  • Multi-Party Private Set Intersection: An Information-Theoretic Approach. Zhusheng Wang, Karim Banawan, and Sennur Ulukus. 2021

Applications

  • Multiple Shop owners or digital services want to launch a collective promotion campaign. To do so, these shops must identify their mutual set of customers, without violating the privacy of the customers. ([BROKEN LINK: cite:@miyajiScalableMultipartyPrivate2015; @kolesnikovPracticalMultipartyPrivate2017])
  • Multiple organizations come together to catch an intruder in a common network. The organizations keep a list of suspicious IPs and by computing the intersection they narrow them down. Since IP addresses contain personal information it is important to keep them private. (Practical Multi-party Private Set Intersection from Symmetric-Key Techniques. Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, and Ni Trieu. 2017; Privacy-Preserving Set Operations. Lea Kissner, and Dawn Song. 2005 inbarEfficientScalableMultiparty2018)
  • Detect botnets. (An Algebraic Approach to Maliciously Secure Private Set Intersection. Satrajit Ghosh, and Tobias Nilges. 2017)
  • An investigative agency needs to narrow down a list of suspects by cooperating with multiple other agencies. Since none of the agencies can share plain data with each other, they engage in an MPSI protocol to only consider relevant suspects. Multi-Party Private Set Intersection: An Information-Theoretic Approach. Zhusheng Wang, Karim Banawan, and Sennur Ulukus. 2021
  • More applications in SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. Jelle Vos, Mauro Conti, and Zekeriya Erkin. 2024