Cryptanalysis of a Fast Private Information Retrieval Protocol
Title | Cryptanalysis of a Fast Private Information Retrieval Protocol |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Liu, Jiayang, Bi, Jingguo |
Conference Name | Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4286-5 |
Keywords | Collaboration, composability, dimension-reduced attack, Human Behavior, information theoretic security, lattice-based, Metrics, pir protocol, pubcrawl, Resiliency, Scalability |
Abstract | A private information retrieval (abbreviated as PIR) protocol deals with the schemes that allow a user to retrieve privately an element of a non-replicated database. The security of PIR protocol is that the user wants to retrieve information in a database without the database knowing which information has being retrieved. This is widely applied in medical files, video or songs databases or even stock exchanges share prices. At ISIT 2008, Carlos Aguilar Melchor and Philippe Gaborit presented a lattice-based PIR protocol, whose security based on problems close to coding theory problems known to be NP-complete. In this paper, we present a practical attack on this PIR protocol when the number of elements in the database is not big. More specifically, we can firstly uncover the hidden linear relationship between the public matrices and noisy matrices, and then propose an efficient dimension-reduced attack to locate the index of the element which the user retrieved. |
URL | http://doi.acm.org/10.1145/2898420.2898427 |
DOI | 10.1145/2898420.2898427 |
Citation Key | liu_cryptanalysis_2016 |