Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation
| but.committee | doc. Ing. Luděk Nechvátal, Ph.D. (předseda) prof. RNDr. Josef Šlapal, CSc. (místopředseda) doc. Ing. Petr Tomášek, Ph.D. (člen) doc. Ing. Jiří Šremr, Ph.D. (člen) prof. RNDr. Miloslav Druckmüller, CSc. (člen) Prof. Bruno Rubino, Ph.D. (člen) Prof. Corrado Lattanzio, Ph.D. (člen) Gennaro Ciampa, Ph.D. (člen) | cs |
| but.defence | After the student presented the master's thesis, the secretary read the supervisor's and opponent’s reports. The student has splendidly answered the questions of the reviewer. Additionally, doc. Ing. Luděk Nechvátal, Ph.D. asked if the presented protocols are used in the real world. Furthermore, doc. Ing. Petr Tomášek, Ph.D. asked about the dependence of bits transmitted and the number of elements in input sets. The student has answered all the questions. | cs |
| but.jazyk | angličtina (English) | |
| but.program | Applied and Interdisciplinary Mathematics | cs |
| but.result | práce byla úspěšně obhájena | cs |
| dc.contributor.advisor | Civino, Roberto | en |
| dc.contributor.author | Khan, Ahmed | en |
| dc.contributor.referee | Aragona, Riccardo | en |
| dc.date.created | 2025 | cs |
| dc.description.abstract | This thesis presents a comparative study of various cryptographic protocols designed for 2-Party Secure Computation (2PSC) and, more precisely, for Private Set Intersection (PSI), with a particular focus on their implementation and performance under malicious adversary models. Among the protocols explored, the OPA-based and PSZ protocols were selected for detailed analysis due to their strong security guarantees and efficiency. Both protocols were implemented using Python and subjected to empirical testing. The OPA-based protocol employs algebraic constructions such as Oblivious Linear Function Evaluation (OLE), its enhanced version OLE+, and Oblivious Polynomial Addition (OPA), whereas the PSZ protocol leverages modern Oblivious Transfer (OT) extensions and Pseudo-Random Functions (PRFs). The thesis evaluates these protocols in terms of computational cost and communication overhead. The results offer a practical perspective on using such cryptographic primitives in real-world applications. | en |
| dc.description.abstract | This thesis presents a comparative study of various cryptographic protocols designed for 2-Party Secure Computation (2PSC) and, more precisely, for Private Set Intersection (PSI), with a particular focus on their implementation and performance under malicious adversary models. Among the protocols explored, the OPA-based and PSZ protocols were selected for detailed analysis due to their strong security guarantees and efficiency. Both protocols were implemented using Python and subjected to empirical testing. The OPA-based protocol employs algebraic constructions such as Oblivious Linear Function Evaluation (OLE), its enhanced version OLE+, and Oblivious Polynomial Addition (OPA), whereas the PSZ protocol leverages modern Oblivious Transfer (OT) extensions and Pseudo-Random Functions (PRFs). The thesis evaluates these protocols in terms of computational cost and communication overhead. The results offer a practical perspective on using such cryptographic primitives in real-world applications. | cs |
| dc.description.mark | A | cs |
| dc.identifier.citation | KHAN, A. Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation [online]. Brno: Vysoké učení technické v Brně. Fakulta strojního inženýrství. 2025. | cs |
| dc.identifier.other | 165931 | cs |
| dc.identifier.uri | http://hdl.handle.net/11012/253562 | |
| dc.language.iso | en | cs |
| dc.publisher | Vysoké učení technické v Brně. Fakulta strojního inženýrství | cs |
| dc.rights | Standardní licenční smlouva - přístup k plnému textu bez omezení | cs |
| dc.subject | PSI | en |
| dc.subject | Secure computation | en |
| dc.subject | protocol | en |
| dc.subject | 2PSI | en |
| dc.subject | OPA | en |
| dc.subject | PSZ | en |
| dc.subject | OT | en |
| dc.subject | PRF | en |
| dc.subject | OEP | en |
| dc.subject | OLE | en |
| dc.subject | OLE+. | en |
| dc.subject | PSI | cs |
| dc.subject | Secure computation | cs |
| dc.subject | protocol | cs |
| dc.subject | 2PSI | cs |
| dc.subject | OPA | cs |
| dc.subject | PSZ | cs |
| dc.subject | OT | cs |
| dc.subject | PRF | cs |
| dc.subject | OEP | cs |
| dc.subject | OLE | cs |
| dc.subject | OLE+. | cs |
| dc.title | Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation | en |
| dc.title.alternative | Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation | cs |
| dc.type | Text | cs |
| dc.type.driver | masterThesis | en |
| dc.type.evskp | diplomová práce | cs |
| dcterms.dateAccepted | 2025-06-17 | cs |
| dcterms.modified | 2025-06-20-12:24:33 | cs |
| eprints.affiliatedInstitution.faculty | Fakulta strojního inženýrství | cs |
| sync.item.dbid | 165931 | en |
| sync.item.dbtype | ZP | en |
| sync.item.insts | 2025.08.27 02:57:58 | en |
| sync.item.modts | 2025.08.26 19:57:13 | en |
| thesis.discipline | bez specializace | cs |
| thesis.grantor | Vysoké učení technické v Brně. Fakulta strojního inženýrství. Ústav matematiky | cs |
| thesis.level | Inženýrský | cs |
| thesis.name | Ing. | cs |
