| As informatization progresses in society,the massive production and high aggregation of data have made privacy protection increasingly complex and difficult.Various privacy leakage issues and data security incidents have drawn attention from all walks of life.As a result,countries and regions have introduced corresponding laws and regulations.For example,America introduced American Data Privacy and Protection Act draft in 2022,and China passed the Data Security Law of the People’s Republic of China in June 2021.These laws and regulations have raised higher requirements for data security and privacy protection.At the same time,data has become impetus of social development,the demand for efficient data processing has become more urgent.This requires us to achieve the unity of efficiency and privacy protection in data processing under new scenarios.Secure multi-party computation is an important tool in privacy protection,and private set operations are an important research module in secure multi-party computation.This paper mainly studies the practical technology of privacy set operation protocols in general secure multi-party computation.Privacy set operation protocols can be used as application layer protocols to solve specific application problems,and can also be used as basic modules to construct other high-level application protocols.This paper focuses on the Private Set Intersection(PSI),Threshold Private Set Union,and other related technologies in private set operation,while emphasizing privacy protection and efficiency of protocol operation.The specific research contents are as follows:(1)Research on leakage models under multi-party set operations.Analyze a type of set operation protocol that causes leakage and propose improvement ideas.(2)Research on multi-party private set intersection protocol.This paper proposes an multiparty privacy set intersection protocol based on universal set encoding,which improves the privacy leakage problems of multi-party set operations under certain scenario.we also proves the security of the improved protocol.In addition,this paper also proposes a multi-party privacy set union protocol by analogy with the intersection protocol.(3)Secure computation of multi-party threshold union.Compared with existing protocol,this paper proposes a more efficient secure set threshold union computation protocol.In summary,this paper improves the security of multi-party set operations,proposes multiparty private set intersection and threshold union protocols.This paper focuses on the improvement of the security and computational efficiency of existing protocol,and improves the availability of these protocols. |