Private Set Membership (PSM) – Cryptographic Protocol That Allows Clients To Privately Query

Private Set Membership (PSM) is a cryptographic protocol that allows clients to privately query whether the client’s identifier is a member of a set of identifiers held by a server in a privacy-preserving manner.

At a high level, PSM provides the following privacy guarantees:

  • The server does not learn the client’s queried identifier in the plaintext.
  • The server does not learn whether the client’s query results in a membership or non-membership determination.
  • The querying client does not learn any information about the set of identifiers that are stored by the server beyond whether the querying client’s identifier is a member or not of the server-held set of identifiers. In other words, the querying client learns the bare minimum amount of information which is only the answer of the membership query.

Dependencies

The Private Set Membership library requires the following dependencies:

How to build

In order to run this library, you need to install Bazel, if you don’t have it already. [Follow the instructions for your platform on the Bazel website. Make sure you are installing version 4.2.1 or above.] (https://docs.bazel.build/versions/master/install.html)

You also need to install Git, if you don’t have it already. Follow the instructions for your platform on the Git website.

Once you’ve installed Bazel and Git, open a Terminal and clone the repository into a local folder.

Navigate into the private-membership folder you just created, and build the library and dependencies using Bazel. Note, the library must be built using C++17.

cd private-membership
bazel build ... --cxxopt="-std=c++17"

You may also run all tests (recursively) using the following command:

bazel test ... --cxxopt="-std=c++17"

Disclaimers

This is not an officially supported Google product. The software is provided as-is without any guarantees or warranties, express or implied.

pqJa8i58 Wk

click here to read full Article

Read More on Pentesting Tools

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: