Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation
Loading...
Date
Authors
Khan, Ahmed
Advisor
Referee
Mark
A
Journal Title
Journal ISSN
Volume Title
Publisher
Vysoké učení technické v Brně. Fakulta strojního inženýrství
ORCID
Abstract
This thesis presents a comparative study of various cryptographic protocols designed for 2-Party Secure Computation (2PSC) and, more precisely, for Private Set Intersection (PSI), with a particular focus on their implementation and performance under malicious adversary models. Among the protocols explored, the OPA-based and PSZ protocols were selected for detailed analysis due to their strong security guarantees and efficiency. Both protocols were implemented using Python and subjected to empirical testing. The OPA-based protocol employs algebraic constructions such as Oblivious Linear Function Evaluation (OLE), its enhanced version OLE+, and Oblivious Polynomial Addition (OPA), whereas the PSZ protocol leverages modern Oblivious Transfer (OT) extensions and Pseudo-Random Functions (PRFs). The thesis evaluates these protocols in terms of computational cost and communication overhead. The results offer a practical perspective on using such cryptographic primitives in real-world applications.
This thesis presents a comparative study of various cryptographic protocols designed for 2-Party Secure Computation (2PSC) and, more precisely, for Private Set Intersection (PSI), with a particular focus on their implementation and performance under malicious adversary models. Among the protocols explored, the OPA-based and PSZ protocols were selected for detailed analysis due to their strong security guarantees and efficiency. Both protocols were implemented using Python and subjected to empirical testing. The OPA-based protocol employs algebraic constructions such as Oblivious Linear Function Evaluation (OLE), its enhanced version OLE+, and Oblivious Polynomial Addition (OPA), whereas the PSZ protocol leverages modern Oblivious Transfer (OT) extensions and Pseudo-Random Functions (PRFs). The thesis evaluates these protocols in terms of computational cost and communication overhead. The results offer a practical perspective on using such cryptographic primitives in real-world applications.
This thesis presents a comparative study of various cryptographic protocols designed for 2-Party Secure Computation (2PSC) and, more precisely, for Private Set Intersection (PSI), with a particular focus on their implementation and performance under malicious adversary models. Among the protocols explored, the OPA-based and PSZ protocols were selected for detailed analysis due to their strong security guarantees and efficiency. Both protocols were implemented using Python and subjected to empirical testing. The OPA-based protocol employs algebraic constructions such as Oblivious Linear Function Evaluation (OLE), its enhanced version OLE+, and Oblivious Polynomial Addition (OPA), whereas the PSZ protocol leverages modern Oblivious Transfer (OT) extensions and Pseudo-Random Functions (PRFs). The thesis evaluates these protocols in terms of computational cost and communication overhead. The results offer a practical perspective on using such cryptographic primitives in real-world applications.
Description
Citation
KHAN, A. Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation [online]. Brno: Vysoké učení technické v Brně. Fakulta strojního inženýrství. 2025.
Document type
Document version
Date of access to the full text
Language of document
en
Study field
bez specializace
Comittee
doc. Ing. Luděk Nechvátal, Ph.D. (předseda)
prof. RNDr. Josef Šlapal, CSc. (místopředseda)
doc. Ing. Petr Tomášek, Ph.D. (člen)
doc. Ing. Jiří Šremr, Ph.D. (člen)
prof. RNDr. Miloslav Druckmüller, CSc. (člen)
Prof. Bruno Rubino, Ph.D. (člen)
Prof. Corrado Lattanzio, Ph.D. (člen)
Gennaro Ciampa, Ph.D. (člen)
Date of acceptance
2025-06-17
Defence
After the student presented the master's thesis, the secretary read the supervisor's and opponent’s reports. The student has splendidly answered the questions of the reviewer. Additionally, doc. Ing. Luděk Nechvátal, Ph.D. asked if the presented protocols are used in the real world. Furthermore, doc. Ing. Petr Tomášek, Ph.D. asked about the dependence of bits transmitted and the number of elements in input sets. The student has answered all the questions.
Result of defence
práce byla úspěšně obhájena
