Breaking and Fixing the Security Proof of Garbled Bloom Filters

被引:0
|
作者
Van Rompay, Cedric [1 ]
Onen, Melek [1 ]
机构
[1] EURECOM, Biot, France
关键词
Garbled bloom filter; Private set intersection; Provable security;
D O I
10.1007/978-3-319-95729-6_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We identify a flaw in the proof of security of Garbled Bloom Filters, a recent hash structure introduced by Dong et al. (ACM CCS 2013) that is used to design Private Set Intersection (PSI) protocols, a important family of protocols for secure cloud computing. We give counter-examples invalidating a claim that is central to the original proof and we show that variants of the GBF construction have the same issue in their security analysis. We then give a new proof of security that shows that Garbled Bloom Filters are secure nonetheless.
引用
收藏
页码:263 / 277
页数:15
相关论文
共 50 条
  • [1] Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires
    Raine Nieminen
    Thomas Schneider
    Journal of Cryptology, 2023, 36
  • [2] Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires
    Nieminen, Raine
    Schneider, Thomas
    JOURNAL OF CRYPTOLOGY, 2023, 36 (04)
  • [3] Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters
    Inbar, Roi
    Omri, Eran
    Pinkas, Benny
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 235 - 252
  • [4] A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters
    Blasco, Jorge
    Di Pietro, Roberto
    Orfila, Agustin
    Sorniotti, Alessandro
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 481 - 489
  • [5] Enhancing the Security of Bloom-Filters with Blind Signatures
    Nojima, Ryo
    Tamura, Jin
    Kadobayashi, Youki
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 1019 - +
  • [6] Symbolic security of garbled circuits
    Li, Baiyu
    Micciancio, Daniele
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 147 - 161
  • [7] Increasing network processing performance and security using Bloom filters
    Wolowiec, M
    Botwicz, J
    Sapiecha, P
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS IV, 2006, 6159
  • [8] Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices
    Gasti, Paolo
    Chen, Yu
    PROCEEDINGS OF THE 18TH EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, 2010, : 624 - 630
  • [9] Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium
    Barbosa, Manuel
    Barthe, Gilles
    Doczkal, Christian
    Don, Jelle
    Fehr, Serge
    Gregoire, Benjamin
    Huang, Yu-Hsuan
    Hulsing, Andreas
    Lee, Yi
    Wu, Xiaodi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 358 - 389
  • [10] BLOOM FILTERS
    WELLS, B
    DR DOBBS JOURNAL, 1995, 20 (01): : 12 - 12