On the privacy of a code-based single-server computational PIR scheme
We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Remov...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2020-04 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Bordage, Sarah Lavauzelle, Julien |
description | We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb{F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2385541281</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2385541281</sourcerecordid><originalsourceid>FETCH-proquest_journals_23855412813</originalsourceid><addsrcrecordid>eNqNi8EKgkAUAJcgSMp_eNB5Qd-65T2MOhXRPTZ9pqKu7VuF_j4PfUCnOczMQgSoVCzTBHElQuYmiiLc7VFrFYjs0oOvCAZXTyb_gC3BQG4Lkk_DVADX_aslyeQmcrPohtEbX9vetHA934DzijraiGVpWqbwx7XYHrP74SQHZ98jsX80dnTzww9UqdZJjGms_qu-LCw6Vw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2385541281</pqid></control><display><type>article</type><title>On the privacy of a code-based single-server computational PIR scheme</title><source>Free E- Journals</source><creator>Bordage, Sarah ; Lavauzelle, Julien</creator><creatorcontrib>Bordage, Sarah ; Lavauzelle, Julien</creatorcontrib><description>We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb{F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Mathematical analysis ; Matrix methods ; Polynomials</subject><ispartof>arXiv.org, 2020-04</ispartof><rights>2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Bordage, Sarah</creatorcontrib><creatorcontrib>Lavauzelle, Julien</creatorcontrib><title>On the privacy of a code-based single-server computational PIR scheme</title><title>arXiv.org</title><description>We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb{F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted.</description><subject>Mathematical analysis</subject><subject>Matrix methods</subject><subject>Polynomials</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNi8EKgkAUAJcgSMp_eNB5Qd-65T2MOhXRPTZ9pqKu7VuF_j4PfUCnOczMQgSoVCzTBHElQuYmiiLc7VFrFYjs0oOvCAZXTyb_gC3BQG4Lkk_DVADX_aslyeQmcrPohtEbX9vetHA934DzijraiGVpWqbwx7XYHrP74SQHZ98jsX80dnTzww9UqdZJjGms_qu-LCw6Vw</recordid><startdate>20200401</startdate><enddate>20200401</enddate><creator>Bordage, Sarah</creator><creator>Lavauzelle, Julien</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20200401</creationdate><title>On the privacy of a code-based single-server computational PIR scheme</title><author>Bordage, Sarah ; Lavauzelle, Julien</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_23855412813</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Mathematical analysis</topic><topic>Matrix methods</topic><topic>Polynomials</topic><toplevel>online_resources</toplevel><creatorcontrib>Bordage, Sarah</creatorcontrib><creatorcontrib>Lavauzelle, Julien</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bordage, Sarah</au><au>Lavauzelle, Julien</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>On the privacy of a code-based single-server computational PIR scheme</atitle><jtitle>arXiv.org</jtitle><date>2020-04-01</date><risdate>2020</risdate><eissn>2331-8422</eissn><abstract>We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb{F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2020-04 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2385541281 |
source | Free E- Journals |
subjects | Mathematical analysis Matrix methods Polynomials |
title | On the privacy of a code-based single-server computational PIR scheme |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T07%3A12%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=On%20the%20privacy%20of%20a%20code-based%20single-server%20computational%20PIR%20scheme&rft.jtitle=arXiv.org&rft.au=Bordage,%20Sarah&rft.date=2020-04-01&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2385541281%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2385541281&rft_id=info:pmid/&rfr_iscdi=true |