Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation

Loading...
Thumbnail Image

Date

Authors

Khan, Ahmed

Mark

A

Journal Title

Journal ISSN

Volume Title

Publisher

Vysoké učení technické v Brně. Fakulta strojního inženýrství

ORCID

Abstract

This thesis presents a comparative study of various cryptographic protocols designed for 2-Party Secure Computation (2PSC) and, more precisely, for Private Set Intersection (PSI), with a particular focus on their implementation and performance under malicious adversary models. Among the protocols explored, the OPA-based and PSZ protocols were selected for detailed analysis due to their strong security guarantees and efficiency. Both protocols were implemented using Python and subjected to empirical testing. The OPA-based protocol employs algebraic constructions such as Oblivious Linear Function Evaluation (OLE), its enhanced version OLE+, and Oblivious Polynomial Addition (OPA), whereas the PSZ protocol leverages modern Oblivious Transfer (OT) extensions and Pseudo-Random Functions (PRFs). The thesis evaluates these protocols in terms of computational cost and communication overhead. The results offer a practical perspective on using such cryptographic primitives in real-world applications.
This thesis presents a comparative study of various cryptographic protocols designed for 2-Party Secure Computation (2PSC) and, more precisely, for Private Set Intersection (PSI), with a particular focus on their implementation and performance under malicious adversary models. Among the protocols explored, the OPA-based and PSZ protocols were selected for detailed analysis due to their strong security guarantees and efficiency. Both protocols were implemented using Python and subjected to empirical testing. The OPA-based protocol employs algebraic constructions such as Oblivious Linear Function Evaluation (OLE), its enhanced version OLE+, and Oblivious Polynomial Addition (OPA), whereas the PSZ protocol leverages modern Oblivious Transfer (OT) extensions and Pseudo-Random Functions (PRFs). The thesis evaluates these protocols in terms of computational cost and communication overhead. The results offer a practical perspective on using such cryptographic primitives in real-world applications.

Description

Citation

KHAN, A. Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation [online]. Brno: Vysoké učení technické v Brně. Fakulta strojního inženýrství. 2025.

Document type

Document version

Date of access to the full text

Language of document

en

Study field

bez specializace

Comittee

doc. Ing. Luděk Nechvátal, Ph.D. (předseda) prof. RNDr. Josef Šlapal, CSc. (místopředseda) doc. Ing. Petr Tomášek, Ph.D. (člen) doc. Ing. Jiří Šremr, Ph.D. (člen) prof. RNDr. Miloslav Druckmüller, CSc. (člen) Prof. Bruno Rubino, Ph.D. (člen) Prof. Corrado Lattanzio, Ph.D. (člen) Gennaro Ciampa, Ph.D. (člen)

Date of acceptance

2025-06-17

Defence

After the student presented the master's thesis, the secretary read the supervisor's and opponent’s reports. The student has splendidly answered the questions of the reviewer. Additionally, doc. Ing. Luděk Nechvátal, Ph.D. asked if the presented protocols are used in the real world. Furthermore, doc. Ing. Petr Tomášek, Ph.D. asked about the dependence of bits transmitted and the number of elements in input sets. The student has answered all the questions.

Result of defence

práce byla úspěšně obhájena

DOI

Collections

Endorsement

Review

Supplemented By

Referenced By

Citace PRO