{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:30:06Z","timestamp":1766449806981,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","funder":[{"name":"The National Natural Science Foundation of China","award":["62272269"],"award-info":[{"award-number":["62272269"]}]},{"name":"Scientific Research Innovation Capability Support Project for Young Faculty","award":["ZYGXQNJSKYCXNLZCXM-I21"],"award-info":[{"award-number":["ZYGXQNJSKYCXNLZCXM-I21"]}]},{"name":"Taishan Scholar Program of Shandong Province"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765234","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:37:25Z","timestamp":1763854645000},"page":"4079-4093","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi-Party Private Set Operations from Predicative Zero-Sharing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5323-7119","authenticated-orcid":false,"given":"Minglang","family":"Dong","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, Qingdao, China and State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2553-1281","authenticated-orcid":false,"given":"Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, Qingdao, China, State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China, and State Key Laboratory of Cryptology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5403-2866","authenticated-orcid":false,"given":"Cong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute for Advanced Study, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7500-3531","authenticated-orcid":false,"given":"Yujie","family":"Bai","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, Qingdao, China and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7530-9745","authenticated-orcid":false,"given":"Yang","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, Qingdao, China and State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3118879"},{"key":"e_1_3_2_1_2_1","first-page":"420","volume-title":"Efficient Multiparty Protocols Using Circuit Randomization. In CRYPTO","volume":"576","author":"Beaver Donald","year":"1991","unstructured":"Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization. In CRYPTO 1991, Vol. 576. Springer, 420-432."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3523254"},{"key":"e_1_3_2_1_4_1","volume-title":"Joon Young Seo, and Kevin Yeo","author":"Bienstock Alexander","year":"2023","unstructured":"Alexander Bienstock, Sarvar Patel, Joon Young Seo, and Kevin Yeo. 2023. Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps. In USENIX Security 2023. 301-318."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414479"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31371-4_7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484591"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0018"},{"volume-title":"Inscrypt 2022 (Lecture Notes in Computer Science)","author":"Chen You","key":"e_1_3_2_1_9_1","unstructured":"You Chen, Ning Ding, Dawu Gu, and Yang Bian. 2022. Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion. In Inscrypt 2022 (Lecture Notes in Computer Science). Springer."},{"key":"e_1_3_2_1_10_1","volume-title":"MPSU: An efficient C repo implementing MPSU''. https:\/\/github.com\/real-world-cryptography\/MPSU.","author":"Dong Minglang","year":"2025","unstructured":"Minglang Dong, Yujie Bai, and Yang Cao. 2025a. MPSU: An efficient C repo implementing MPSU''. https:\/\/github.com\/real-world-cryptography\/MPSU."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Minglang Dong Yu Chen Cong Zhang Yujie Bai and Yang Cao. 2025b. Multi-Party Private Set Operations from Predicative Zero-Sharing. Cryptology ePrint Archive Paper 2025\/640. https:\/\/eprint.iacr.org\/2025\/640","DOI":"10.1145\/3719027.3765234"},{"key":"e_1_3_2_1_12_1","volume-title":"Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions. In 34rd USENIX Security Symposium, USENIX Security","author":"Dong Minglang","year":"2025","unstructured":"Minglang Dong, Cong Zhang, Yujie Bai, and Yu Chen. 2025c. Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions. In 34rd USENIX Security Symposium, USENIX Security 2025. USENIX Association."},{"key":"e_1_3_2_1_13_1","volume-title":"Keyword Search and Oblivious Pseudorandom Functions. In TCC 2005 (Lecture Notes in Computer Science","volume":"324","author":"Freedman Michael J.","year":"2005","unstructured":"Michael J. Freedman, Yuval Ishai, Benny Pinkas, and Omer Reingold. 2005. Keyword Search and Oblivious Pseudorandom Functions. In TCC 2005 (Lecture Notes in Computer Science, Vol. 3378). Springer, 303-324."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"e_1_3_2_1_15_1","volume-title":"Privacy-Preserving Set Union. In ACNS 2007 (Lecture Notes in Computer Science","volume":"252","author":"Frikken Keith B.","year":"2007","unstructured":"Keith B. Frikken. 2007. Privacy-Preserving Set Union. In ACNS 2007 (Lecture Notes in Computer Science, Vol. 4521). Springer, 237-252."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0133"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0041"},{"key":"e_1_3_2_1_18_1","volume-title":"CCS","author":"Gao Ying","year":"2024","unstructured":"Ying Gao, Yuanchao Luo, Longxin Wang, Xiang Liu, Lin Qi, Wei Wang, and Mengmeng Zhou. 2024a. Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing. In CCS 2024. ACM."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84245-1_14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_6"},{"key":"e_1_3_2_1_21_1","volume-title":"ITC","author":"Giorgi Pascal","year":"2024","unstructured":"Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, and Damien Vergnaud. 2024. Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations. In ITC 2024. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik."},{"volume-title":"Efficient Secure Two-Party Protocols - Techniques and Constructions","author":"Hazay Carmit","key":"e_1_3_2_1_22_1","unstructured":"Carmit Hazay and Yehuda Lindell. 2010. Efficient Secure Two-Party Protocols - Techniques and Constructions. Springer."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54365-8_8"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_13"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security","author":"Jia Yanxue","year":"2024","unstructured":"Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, and Dawu Gu. 2024. Scalable Private Set Union, with Stronger Security. In USENIX Security 2024."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_15"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978381"},{"key":"e_1_3_2_1_28_1","first-page":"1257","volume-title":"CCS","author":"Kolesnikov Vladimir","year":"2017","unstructured":"Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, and Ni Trieu. 2017. Practical Multi-party Private Set Intersection from Symmetric-Key Techniques. In CCS 2017. ACM, 1257-1272."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_15"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8721-4_8"},{"key":"e_1_3_2_1_31_1","first-page":"1151","volume-title":"Fast Malicious Multiparty Private Set Intersection. In CCS","author":"Nevo Ofri","year":"2021","unstructured":"Ofri Nevo, Ni Trieu, and Avishay Yanai. 2021. Simple, Fast Malicious Multiparty Private Set Intersection. In CCS 2021. ACM, 1151-1165."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"e_1_3_2_1_33_1","volume-title":"Malicious Private Set Intersection. In EUROCRYPT","author":"Pinkas Benny","year":"2020","unstructured":"Benny Pinkas, Mike Rosulek, Ni Trieu, and Avishay Yanai. 2020. PSI from PaXoS: Fast, Malicious Private Set Intersection. In EUROCRYPT 2020. Springer."},{"key":"e_1_3_2_1_34_1","volume-title":"Phasing: Private Set Intersection Using Permutation-based Hashing. In USENIX Security","author":"Pinkas Benny","year":"2015","unstructured":"Benny Pinkas, Thomas Schneider, Gil Segev, and Michael Zohner. 2015. Phasing: Private Set Intersection Using Permutation-based Hashing. In USENIX Security 2015. USENIX Association, 515-530."},{"key":"e_1_3_2_1_35_1","volume-title":"Efficient Circuit-Based PSI with Linear Communication. In EUROCRYPT 2019 (Lecture Notes in Computer Science","volume":"153","author":"Pinkas Benny","year":"2019","unstructured":"Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, and Avishay Yanai. 2019. Efficient Circuit-Based PSI with Linear Communication. In EUROCRYPT 2019 (Lecture Notes in Computer Science, Vol. 11478). Springer, 122-153."},{"key":"e_1_3_2_1_36_1","first-page":"797","article-title":"Faster Private Set Intersection Based on OT Extension","volume":"2014","author":"Pinkas Benny","year":"2014","unstructured":"Benny Pinkas, Thomas Schneider, and Michael Zohner. 2014. Faster Private Set Intersection Based on OT Extension. In USENIX Security 2014. 797-812.","journal-title":"USENIX Security"},{"key":"e_1_3_2_1_37_1","unstructured":"Michael O. Rabin. 2005. How To Exchange Secrets with Oblivious Transfer. IACR Cryptol. ePrint Arch. (2005) 187. http:\/\/eprint.iacr.org\/2005\/187"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560658"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_31"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609965"},{"key":"e_1_3_2_1_41_1","volume-title":"Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets. In ICICS 2006 (Lecture Notes in Computer Science","author":"Sang Yingpeng","year":"2006","unstructured":"Yingpeng Sang, Hong Shen, Yasuo Tan, and Naixue Xiong. 2006. Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets. In ICICS 2006 (Lecture Notes in Computer Science, Vol. 4307)."},{"key":"e_1_3_2_1_42_1","volume-title":"Jung Hee Cheon, and Jonathan Katz","author":"Seo Jae Hong","year":"2012","unstructured":"Jae Hong Seo, Jung Hee Cheon, and Jonathan Katz. 2012. Constant-Round Multi-party Private Set Union Using Reversed Laurent Series. In Public Key Cryptography - PKC 2012. Springer, 398-412."},{"key":"e_1_3_2_1_43_1","volume-title":"Secure and Scalable Circuit-based Protocol for Multi-Party Private Set Intersection. CoRR","author":"Su Jiuheng","year":"2023","unstructured":"Jiuheng Su and Zhili Chen. 2023. Secure and Scalable Circuit-based Protocol for Multi-Party Private Set Intersection. CoRR, Vol. abs\/2309.07406 (2023)."},{"key":"e_1_3_2_1_44_1","unstructured":"Jelle Vos Mauro Conti and Zekeriya Erkin. 2022. Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs. IACR Cryptol. ePrint Arch. (2022) 721. https:\/\/eprint.iacr.org\/2022\/721"},{"key":"e_1_3_2_1_45_1","volume-title":"Tsz Hon Yuen, and Kwan Yin Chan","author":"Wu Mingli","year":"2024","unstructured":"Mingli Wu, Tsz Hon Yuen, and Kwan Yin Chan. 2024a. O-Ring and K-Star: Efficient Multi-party Private Set Intersection. In USENIX Security 2024."},{"key":"e_1_3_2_1_46_1","volume-title":"Tsz Hon Yuen, and Kwan Yin Chan","author":"Wu Mingli","year":"2024","unstructured":"Mingli Wu, Tsz Hon Yuen, and Kwan Yin Chan. 2024b. oring. https:\/\/github.com\/private-panda\/oring."},{"key":"e_1_3_2_1_47_1","first-page":"337","volume-title":"USENIX","author":"Zhang Cong","year":"2023","unstructured":"Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, and Dongdai Lin. 2023. Optimal Private Set Union from Multi-Query Reverse Private Membership Test. In USENIX 2023. USENIX Association, 337-354."},{"key":"e_1_3_2_1_48_1","unstructured":"Shuqing Zhang. 2023. Efficient VOLE based Multi-Party PSI with Lower Communication Cost. IACR Cryptol. ePrint Arch. (2023) 1690."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:21:56Z","timestamp":1766442116000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765234"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":48,"alternative-id":["10.1145\/3719027.3765234","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765234","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}