Collective Threshold Multiparty Private Set Intersection Protocols for Cyber Threat Intelligence

C. Guan*, J. S. van Assen, Z. Erkin

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Downloads (Pure)

Abstract

Multiparty private set intersection enables multiple parties to determine the intersection of their private sets without disclosing the actual content. It is pivotal for collaboration in cyber threat intelligence as it allows organizations to share compromising or sensitive data in a privacy-preserving manner. This data includes infected IP addresses, malware hashes and other indicators of compromise. Then, the organizations identify elements that overlap across all datasets and take action to mitigate the threat with the broadest impact. Although, in many cases, the condition that an element be present in all sets is too stringent. Therefore, in this work, we focus on threshold multiparty private set intersection (T-MPSI), a protocol that identifies elements present in a subgroup of the total sets instead of in all sets. We highlight the differences between three different perspectives when computing the threshold intersection: individual—only the party leader learns the elements from their set that meet the threshold, all—all parties learn the elements from their set that meet the threshold, and collective—all parties jointly learn all elements that are present in the threshold, regardless of whether they possess those elements themselves. While many implementations for T-MPSIindividual and T-MPSIall have been proposed, to the best of our knowledge, no implementation for T-MPSIcollective exists. Therefore, we present a generic composition that extends any T-MPSIindividual protocol into a TMPSIcollective protocol. Our extension employs a multiparty private set union to aggregate outputs efficiently. We then provide a comprehensive analysis and runtime evaluation, demonstrating the feasibility of the extension.

Original languageEnglish
Title of host publicationProceedings - 16th IEEE International Workshop on Information Forensics and Security, WIFS 2024
PublisherIEEE
Number of pages6
ISBN (Electronic)9798350364422
DOIs
Publication statusPublished - 2024
Event16th IEEE International Workshop on Information Forensics and Security, WIFS 2024 - Rome, Italy
Duration: 2 Dec 20245 Dec 2024

Publication series

NameProceedings - 16th IEEE International Workshop on Information Forensics and Security, WIFS 2024

Conference

Conference16th IEEE International Workshop on Information Forensics and Security, WIFS 2024
Country/TerritoryItaly
CityRome
Period2/12/245/12/24

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Fingerprint

Dive into the research topics of 'Collective Threshold Multiparty Private Set Intersection Protocols for Cyber Threat Intelligence'. Together they form a unique fingerprint.

Cite this