Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation

but.committeedoc. Ing. Luděk Nechvátal, Ph.D. (předseda) prof. RNDr. Josef Šlapal, CSc. (místopředseda) doc. Ing. Petr Tomášek, Ph.D. (člen) doc. Ing. Jiří Šremr, Ph.D. (člen) prof. RNDr. Miloslav Druckmüller, CSc. (člen) Prof. Bruno Rubino, Ph.D. (člen) Prof. Corrado Lattanzio, Ph.D. (člen) Gennaro Ciampa, Ph.D. (člen)cs
but.defenceAfter the student presented the master's thesis, the secretary read the supervisor's and opponent’s reports. The student has splendidly answered the questions of the reviewer. Additionally, doc. Ing. Luděk Nechvátal, Ph.D. asked if the presented protocols are used in the real world. Furthermore, doc. Ing. Petr Tomášek, Ph.D. asked about the dependence of bits transmitted and the number of elements in input sets. The student has answered all the questions.cs
but.jazykangličtina (English)
but.programApplied and Interdisciplinary Mathematicscs
but.resultpráce byla úspěšně obhájenacs
dc.contributor.advisorCivino, Robertoen
dc.contributor.authorKhan, Ahmeden
dc.contributor.refereeAragona, Riccardoen
dc.date.created2025cs
dc.description.abstractThis thesis presents a comparative study of various cryptographic protocols designed for 2-Party Secure Computation (2PSC) and, more precisely, for Private Set Intersection (PSI), with a particular focus on their implementation and performance under malicious adversary models. Among the protocols explored, the OPA-based and PSZ protocols were selected for detailed analysis due to their strong security guarantees and efficiency. Both protocols were implemented using Python and subjected to empirical testing. The OPA-based protocol employs algebraic constructions such as Oblivious Linear Function Evaluation (OLE), its enhanced version OLE+, and Oblivious Polynomial Addition (OPA), whereas the PSZ protocol leverages modern Oblivious Transfer (OT) extensions and Pseudo-Random Functions (PRFs). The thesis evaluates these protocols in terms of computational cost and communication overhead. The results offer a practical perspective on using such cryptographic primitives in real-world applications.en
dc.description.abstractThis thesis presents a comparative study of various cryptographic protocols designed for 2-Party Secure Computation (2PSC) and, more precisely, for Private Set Intersection (PSI), with a particular focus on their implementation and performance under malicious adversary models. Among the protocols explored, the OPA-based and PSZ protocols were selected for detailed analysis due to their strong security guarantees and efficiency. Both protocols were implemented using Python and subjected to empirical testing. The OPA-based protocol employs algebraic constructions such as Oblivious Linear Function Evaluation (OLE), its enhanced version OLE+, and Oblivious Polynomial Addition (OPA), whereas the PSZ protocol leverages modern Oblivious Transfer (OT) extensions and Pseudo-Random Functions (PRFs). The thesis evaluates these protocols in terms of computational cost and communication overhead. The results offer a practical perspective on using such cryptographic primitives in real-world applications.cs
dc.description.markAcs
dc.identifier.citationKHAN, A. Comparison of Protocols for Private Set Intersection and 2-Party Secure Computation [online]. Brno: Vysoké učení technické v Brně. Fakulta strojního inženýrství. 2025.cs
dc.identifier.other165931cs
dc.identifier.urihttp://hdl.handle.net/11012/253562
dc.language.isoencs
dc.publisherVysoké učení technické v Brně. Fakulta strojního inženýrstvícs
dc.rightsStandardní licenční smlouva - přístup k plnému textu bez omezenícs
dc.subjectPSIen
dc.subjectSecure computationen
dc.subjectprotocolen
dc.subject2PSIen
dc.subjectOPAen
dc.subjectPSZen
dc.subjectOTen
dc.subjectPRFen
dc.subjectOEPen
dc.subjectOLEen
dc.subjectOLE+.en
dc.subjectPSIcs
dc.subjectSecure computationcs
dc.subjectprotocolcs
dc.subject2PSIcs
dc.subjectOPAcs
dc.subjectPSZcs
dc.subjectOTcs
dc.subjectPRFcs
dc.subjectOEPcs
dc.subjectOLEcs
dc.subjectOLE+.cs
dc.titleComparison of Protocols for Private Set Intersection and 2-Party Secure Computationen
dc.title.alternativeComparison of Protocols for Private Set Intersection and 2-Party Secure Computationcs
dc.typeTextcs
dc.type.drivermasterThesisen
dc.type.evskpdiplomová prácecs
dcterms.dateAccepted2025-06-17cs
dcterms.modified2025-06-20-12:24:33cs
eprints.affiliatedInstitution.facultyFakulta strojního inženýrstvícs
sync.item.dbid165931en
sync.item.dbtypeZPen
sync.item.insts2025.08.27 02:57:58en
sync.item.modts2025.08.26 19:57:13en
thesis.disciplinebez specializacecs
thesis.grantorVysoké učení technické v Brně. Fakulta strojního inženýrství. Ústav matematikycs
thesis.levelInženýrskýcs
thesis.nameIng.cs

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
final-thesis.pdf
Size:
1.11 MB
Format:
Adobe Portable Document Format
Description:
file final-thesis.pdf
Loading...
Thumbnail Image
Name:
review_165931.html
Size:
7.74 KB
Format:
Hypertext Markup Language
Description:
file review_165931.html

Collections