A STUDY ON SECURE PRIVATE SET UNION SCHEME IN IOT ENVIRONMENT

Authors

  • Ki-Hwan Kim Soonchunhyang University, Asan, South korea
  • Su-Hyun Kim Soonchunhyang University, Asan, South korea
  • Im-Yeong Lee Soonchunhyang University, Asan, South korea

DOI:

https://doi.org/10.20319/stra.2025.5666

Keywords:

Data Privacy, Third Party, Private Set Union, Random Oblivious Transfer, Multi-Key Encryption

Abstract

In the IOT environment, network edges have data, but a centralized server may need to obtain the union from edges for efficient data access. PSU is a cryptographic primitive that allows protocol parties to compute the union of their private datasets without revealing any extra information. Traditional PSU protocols presuppose that all parties must input their private datasets. This assumption doesnt hold in some scenarios where an inputless Third party needs to get the union. For instance, a regulatory organization may need to get the union of patient data from hospitals for statistical analysis, without inputting any dataset. We propose a novel TP-PSU, specifically designed for a setting with three parties and an inputless Third party. Our protocol enables the Third party to compute the union, while preventing the leakage of any other extra information. This includes protecting the origin and duplication of each data item across edge nodes, thus maintaining privacy in the IoT environment.

References

Dong, M., Chen, Y., Zhang, C., & Bai, Y. (2024). Breaking free: Efficient multi-party private set union without non-collusion assumptions. arXiv preprint arXiv:2406.07011.

Gao, J., Nguyen, S., & Trieu, N. (2023). Toward A practical multi-party private set union. Cryptology ePrint Archive.

Jia, Y., Sun, S. F., Zhou, H. S., & Gu, D. (2024). Scalable private set union, with stronger security. In 33rd USENIX Security Symposium (USENIX Security 24) (pp. 6471-6488).

Jia, Y., Sun, S. F., Zhou, H. S., Du, J., & Gu, D. (2022). Shuffle-based private set union: Faster and more secure. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 2947-2964).

Kolesnikov, V., Rosulek, M., Trieu, N., & Wang, X. (2019, November). Scalable private set union from symmetric-key techniques. In International conference on the theory and application of cryptology and information security (pp. 636-666). Cham: Springer International Publishing.

Liu, X., & Gao, Y. (2023, December). Scalable multi-party private set union from multi-query secret-shared private membership test. In International conference on the theory and application of cryptology and information security (pp. 237-271). Singapore: Springer Nature Singapore.

Nguyen, D. T., & Trieu, N. (2022). MPCCache: Privacy-preserving multi-party cooperative cache sharing at the edge. In International Conference on Financial Cryptography and Data Security (pp. 80–99). Cham: Springer International Publishing.

Pinkas, B., Schneider, T., Tkachenko, O., & Yanai, A. (2019). Efficient circuit-based PSI with linear communication. In Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part III 38 (pp. 122-153). Springer International Publishing.

Rabin, M. O. (2005). How to exchange secrets with oblivious transfer. Cryptology ePrint Archive.

Zhang, C., Chen, Y., Liu, W., Zhang, M., & Lin, D. (2022). Optimal Private Set Union from Multi-Query Reverse Private Membership Test. IACR Cryptol. ePrint Arch., 2022, 358.

Downloads

Published

2025-09-02

How to Cite

Ki-Hwan Kim, Su-Hyun Kim, & Im-Yeong Lee. (2025). A STUDY ON SECURE PRIVATE SET UNION SCHEME IN IOT ENVIRONMENT. MATTER: International Journal of Science and Technology, 56–66. https://doi.org/10.20319/stra.2025.5666