Score: 2

Authenticated Private Set Intersection: A Merkle Tree-Based Approach for Enhancing Data Integrity

Published: June 5, 2025 | arXiv ID: 2506.04647v1

By: Zixian Gong , Zhiyong Zheng , Zhe Hu and more

Potential Business Impact:

Protects secret lists from cheating during sharing.

Business Areas:
E-Signature Information Technology, Privacy and Security

Private Set Intersection (PSI) enables secure computation of set intersections while preserving participant privacy, standard PSI existing protocols remain vulnerable to data integrity attacks allowing malicious participants to extract additional intersection information or mislead other parties. In this paper, we propose the definition of data integrity in PSI and construct two authenticated PSI schemes by integrating Merkle Trees with state-of-the-art two-party volePSI and multi-party mPSI protocols. The resulting two-party authenticated PSI achieves communication complexity $\mathcal{O}(n \lambda+n \log n)$, aligning with the best-known unauthenticated PSI schemes, while the multi-party construction is $\mathcal{O}(n \kappa+n \log n)$ which introduces additional overhead due to Merkle tree inclusion proofs. Due to the incorporation of integrity verification, our authenticated schemes incur higher costs compared to state-of-the-art unauthenticated schemes. We also provide efficient implementations of our protocols and discuss potential improvements, including alternative authentication blocks.

Country of Origin
🇨🇳 China


Page Count
14 pages

Category
Computer Science:
Cryptography and Security