Breaking and Fixing the Security Proof of Garbled Bloom Filters

被引:0
|
作者
Van Rompay, Cedric [1 ]
Onen, Melek [1 ]
机构
[1] EURECOM, Biot, France
关键词
Garbled bloom filter; Private set intersection; Provable security;
D O I
10.1007/978-3-319-95729-6_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We identify a flaw in the proof of security of Garbled Bloom Filters, a recent hash structure introduced by Dong et al. (ACM CCS 2013) that is used to design Private Set Intersection (PSI) protocols, a important family of protocols for secure cloud computing. We give counter-examples invalidating a claim that is central to the original proof and we show that variants of the GBF construction have the same issue in their security analysis. We then give a new proof of security that shows that Garbled Bloom Filters are secure nonetheless.
引用
收藏
页码:263 / 277
页数:15
相关论文
共 50 条
  • [41] Reducing the Number of Bloom Filters
    Gong, Qingge
    Yang, Tong
    Tong, Hongwei
    Shi, Kai
    Li, Jinghui
    Wu, Xianyan
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2014, : 572 - 576
  • [42] Algebraic operations on Bloom filters
    School of Computer and Communication, Hunan University, Changsha 410082, China
    不详
    不详
    不详
    Tien Tzu Hsueh Pao, 2008, 5 (869-874):
  • [43] PASSWORD GENERATION BY BLOOM FILTERS
    STALLINGS, W
    DR DOBBS JOURNAL, 1994, 19 (08): : 119 - &
  • [44] Fast Bloom Filters and Their Generalization
    Qiao, Yan
    Li, Tao
    Chen, Shigang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 93 - 103
  • [45] Bloofi: Multidimensional Bloom filters
    Crainiceanu, Adina
    Lemire, Daniel
    INFORMATION SYSTEMS, 2015, 54 : 311 - 324
  • [46] NATURES FILTERS SET TO BLOOM
    OTTEWELL, S
    CHEMICAL ENGINEER-LONDON, 1993, (552): : 16 - 16
  • [47] Bloom filters in probabilistic verification
    Dillinger, PC
    Manolios, P
    FORMAL METHODS IN COMPUTER-AIDED DESIGN, PROCEEDINGS, 2004, 3312 : 367 - 381
  • [48] Bloom filters in probabilistic verification
    Dillinger, PC
    Manolios, P
    FORMAL METHODS IN COMPUTER-AIDED DESIGN, 2004, 3312 : 367 - 381
  • [49] Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks
    Agrawal, Shweta
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 3 - 35
  • [50] Breaking and Fixing Anonymous Credentials for the Cloud
    Haboeck, Ulrich
    Krenn, Stephan
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 249 - 269