On the privacy of a code-based single-server computational PIR scheme

We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Remov...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2020-04
Hauptverfasser: Bordage, Sarah, Lavauzelle, Julien
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Bordage, Sarah
Lavauzelle, Julien
description We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb{F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2385541281</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2385541281</sourcerecordid><originalsourceid>FETCH-proquest_journals_23855412813</originalsourceid><addsrcrecordid>eNqNi8EKgkAUAJcgSMp_eNB5Qd-65T2MOhXRPTZ9pqKu7VuF_j4PfUCnOczMQgSoVCzTBHElQuYmiiLc7VFrFYjs0oOvCAZXTyb_gC3BQG4Lkk_DVADX_aslyeQmcrPohtEbX9vetHA934DzijraiGVpWqbwx7XYHrP74SQHZ98jsX80dnTzww9UqdZJjGms_qu-LCw6Vw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2385541281</pqid></control><display><type>article</type><title>On the privacy of a code-based single-server computational PIR scheme</title><source>Free E- Journals</source><creator>Bordage, Sarah ; Lavauzelle, Julien</creator><creatorcontrib>Bordage, Sarah ; Lavauzelle, Julien</creatorcontrib><description>We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb{F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Mathematical analysis ; Matrix methods ; Polynomials</subject><ispartof>arXiv.org, 2020-04</ispartof><rights>2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Bordage, Sarah</creatorcontrib><creatorcontrib>Lavauzelle, Julien</creatorcontrib><title>On the privacy of a code-based single-server computational PIR scheme</title><title>arXiv.org</title><description>We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb{F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted.</description><subject>Mathematical analysis</subject><subject>Matrix methods</subject><subject>Polynomials</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNi8EKgkAUAJcgSMp_eNB5Qd-65T2MOhXRPTZ9pqKu7VuF_j4PfUCnOczMQgSoVCzTBHElQuYmiiLc7VFrFYjs0oOvCAZXTyb_gC3BQG4Lkk_DVADX_aslyeQmcrPohtEbX9vetHA934DzijraiGVpWqbwx7XYHrP74SQHZ98jsX80dnTzww9UqdZJjGms_qu-LCw6Vw</recordid><startdate>20200401</startdate><enddate>20200401</enddate><creator>Bordage, Sarah</creator><creator>Lavauzelle, Julien</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20200401</creationdate><title>On the privacy of a code-based single-server computational PIR scheme</title><author>Bordage, Sarah ; Lavauzelle, Julien</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_23855412813</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Mathematical analysis</topic><topic>Matrix methods</topic><topic>Polynomials</topic><toplevel>online_resources</toplevel><creatorcontrib>Bordage, Sarah</creatorcontrib><creatorcontrib>Lavauzelle, Julien</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bordage, Sarah</au><au>Lavauzelle, Julien</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>On the privacy of a code-based single-server computational PIR scheme</atitle><jtitle>arXiv.org</jtitle><date>2020-04-01</date><risdate>2020</risdate><eissn>2331-8422</eissn><abstract>We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in 2020 is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb{F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2020-04
issn 2331-8422
language eng
recordid cdi_proquest_journals_2385541281
source Free E- Journals
subjects Mathematical analysis
Matrix methods
Polynomials
title On the privacy of a code-based single-server computational PIR scheme
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T07%3A12%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=On%20the%20privacy%20of%20a%20code-based%20single-server%20computational%20PIR%20scheme&rft.jtitle=arXiv.org&rft.au=Bordage,%20Sarah&rft.date=2020-04-01&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2385541281%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2385541281&rft_id=info:pmid/&rfr_iscdi=true