<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Mugla Journal of Science and Technology</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2149-3596</issn>
                                                                                                        <publisher>
                    <publisher-name>Mugla Sitki Kocman University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.22531/muglajsci.1075788</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>A NEW MULTI-PARTY PRIVATE SET INTERSECTION PROTOCOL BASED on OPRFs</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-3820-1778</contrib-id>
                                                                <name>
                                    <surname>Bay</surname>
                                    <given-names>Aslı</given-names>
                                </name>
                                                                    <aff>ANTALYA BİLİM ÜNİVERSİTESİ, MÜHENDİSLİK FAKÜLTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-6531-046X</contrib-id>
                                                                <name>
                                    <surname>Kayan</surname>
                                    <given-names>Anıl</given-names>
                                </name>
                                                                    <aff>ANTALYA BİLİM ÜNİVERSİTESİ, MÜHENDİSLİK FAKÜLTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20220628">
                    <day>06</day>
                    <month>28</month>
                    <year>2022</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>1</issue>
                                        <fpage>69</fpage>
                                        <lpage>75</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20220218">
                        <day>02</day>
                        <month>18</month>
                        <year>2022</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20220616">
                        <day>06</day>
                        <month>16</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2015, Mugla Journal of Science and Technology</copyright-statement>
                    <copyright-year>2015</copyright-year>
                    <copyright-holder>Mugla Journal of Science and Technology</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>In many crucial real-world applications, parties must jointly perform some secure multi-party computation (MPC) while keeping their inputs hidden from other parties. Private Set Intersection (PSI), the specific area of Multi-Party Computation, let the parties learn the intersection of their private data sets without sharing their secret data with others. For instance, a smartphone user downloads a messaging application, naturally, he wants to discover who are the other contacts that are using the same application. The naive and insecure solution is to send all contacts to the server to discover them. However, the user does not want to share his contacts with the application for privacy issues. To handle this, in recent years, companies and organizations start to use PSI to enhance privacy and security with a little cost of communication and computation. In this paper, we introduce a novel method to compute Private Set Intersection with multi parties where there are at least three or more parties participating in the protocol. By employing the Zero-Secret Sharing scheme and Oblivious Pseudo-Random Functions (OPRFs), parties securely calculate the intersection with computational and communication complexities which are both linear in the number of parties.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>: Private set intersection</kwd>
                                                    <kwd>  multi-party private set intersection</kwd>
                                                    <kwd>  multi-party computation</kwd>
                                                    <kwd>  oblivious transfer</kwd>
                                                    <kwd>  oblivious pseudorandom function</kwd>
                                                    <kwd>  zero sharing</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Pinkas, B., Schneider, T. and Zohner, M., “Faster private set intersection based on {OT} extension”, 23rd USENIX Security Symposium (USENIX Security 14), 2014, 797-812.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Kolesnikov, V., Matania, N., Pinkas, B., Rosulek, M., and Trieu, N., “Practical multi-party private set intersection from symmetric-key techniques”, 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, 1257-1272.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Chase, M., and Miao, P.,“Private set intersection in the internet setting from lightweight oblivious PRF”,  Annual International Cryptology Conference, 2020,  34-63.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Kolesnikov, V., Kumaresan, R., Rosulek, M., and Trieu, N., ”Efficient batched oblivious PRF with applications to private set intersection”, 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, 818-829.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Pinkas, B., Schneider, T., Segev, G., and Zohner, M., “Phasing: Private set intersection using permutation-based hashing”, 24th USENIX Security Symposium (USENIX Security 15), 2015, 515-530.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Pinkas, B., Rosulek, M., Trieu, N. and Yanai, A., “PSI from PaXoS: fast, malicious private set intersection”, Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2020, 739-767.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Trieu, N., Shehata, K., Saxena, P., Shokri, R. and Song, D., “Epione: Lightweight contact tracing with strong privacy”. arXiv preprint arXiv:2004.13293., 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Thomas, K., Pullman, J., Yeo, K., Raghunathan, A., Kelley, P. G., Invernizzi, L., ... and Bursztein, E., “Protecting accounts from credential stuffing with password breach alerting”, 28th USENIX Security Symposium (USENIX Security 19), 2019, 1556-1571.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Internet: K. Opsahl, R. Reitman, The Disconcerting Details: How Facebook Teams Up With Data Brokers to Show You Targeted Ads, https://www.eff.org/deeplinks/2013/04/disconcerting-details-how-facebook-teams-data-brokers-show-you-targeted-ads , 03.02.2022</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Shen, L., Chen, X., Wang, D., Fang, B. and Dong, Y., “Efficient and private set intersection of human genomes”, 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2018, 761-764.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Freedman, M. J., Nissim, K. and Pinkas, B., “Efficient private matching and set intersection”. International Conference on the Theory and Applications of Cryptographic Techniques, 2004, 1-19.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">De Cristofaro, E. and Tsudik, G., “Experimenting with fast private set intersection”, International Conference on Trust and Trustworthy, 2012, 55-73.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Sang, Y. and Shen, H., ”Privacy preserving set intersection based on bilinear groups”, The Thirty-first Australasian conference on Computer science, 2008, 47-54.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Huang, Y., Evans, D. and Katz, J., “Private set intersection: Are garbled circuits better than custom protocols?”, NDSS. 19th Annual Network &amp; Distributed System Security Symposium, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Yao, A. C. C., “How to generate and exchange secrets”, 27th Annual Symposium on Foundations of Computer Science, 1986, 162-167.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Kiss, Á., Liu, J., Schneider, T., Asokan, N. and Pinkas, B., “Private Set Intersection for Unequal Set Sizes with Mobile Applications”, Proceedings on Privacy Enhancing Technologies, Vol. 4, 177-197, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Inbar, R., Omri, E. and Pinkas, B., “Efficient scalable multiparty private set-intersection via garbled bloom filters”. International Conference on Security and Cryptography for Networks, 2018, 235-252.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Debnath, S. K. and Dutta, R., “Secure and efficient private set intersection cardinality using bloom filter, International Conference on Information Security, 2015, 209-226.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Pinkas, B., Schneider, T., Tkachenko, O. and Yanai, A., “Efficient circuit-based PSI with linear communication”, Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2019, 122-153.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Freedman, M. J., Nissim, K. and Pinkas, B., “Efficient private matching and set intersection”. International Conference on the Theory and Applications of Cryptographic Techniques, 2004, 1-19.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Kissner, L. and Song, D., “Privacy-preserving set operations”,  Annual International Cryptology Conference, 2005, 241-257.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Hazay, C. and Venkitasubramaniam, M., “Scalable multi-party private set-intersection”. IACR International Workshop on Public Key Cryptography, 2017, 175-203.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Goldreich O., &quot;Secure multi-party computation&quot;, Manuscript. Preliminary version 78, 1998.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Miyaji, A., Nakasho, K. and Nishida, S., “Privacy-preserving integration of medical data”, Journal of Medical Systems, Vol. 41(3), 1-10, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Binu V. P. and Sreekumar A., &quot;Simple and efficient secret sharing schemes for sharing data and image.&quot;, International Journal of Computer Science and Information Technologies, Vol. 6 (1), 404-409, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">M. O. Rabin, &quot;How To Exchange Secrets with Oblivious Transfer.&quot; IACR Eprint archive 2005/187, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Kolesnikov, V. and Kumaresan, R., “Improved OT extension for transferring short secrets”, Annual Cryptology Conference, 2013, 54-70.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Pinkas, B., Rosulek, M., Trieu, N. and Yanai, A., “SpOT-light: lightweight private set intersection from sparse OT extension”, Annual International Cryptology Conference, 2019, 401-431.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Alireza K., Mohajeri J. and Mahmoud S., &quot;Efficient scalable multi-party private set intersection using oblivious prf&quot;, International Workshop on Security and Trust Management, 2021, 81-99.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Cheon, J. H., Jarecki, S. and Seo, J. H., “Multi-party privacy-preserving set intersection with quasi-linear complexity”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 95(8), 1366-1378, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Ishai, Y., Kilian, J., Nissim, K. and Petrank, E.. “Extending oblivious transfers efficiently”, Annual International Cryptology Conference, 2013, 145-161.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Internet: P. Rindal, A fast, portable, and easy to use Oblivious Transfer Library, https://github.com/osu-crypto/libOTe, 01.02.2022.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
