当前位置: X-MOL 学术Cryptogr. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
On the privacy of a code-based single-server computational PIR scheme
Cryptography and Communications ( IF 1.2 ) Pub Date : 2021-03-24 , DOI: 10.1007/s12095-021-00477-z
Sarah Bordage , Julien Lavauzelle

We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in [6] is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb {F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted.



中文翻译:

基于代码的单服务器计算PIR方案的私密性

我们展示了Holzbaur,Hollanti和Wachter-Zeh在[6]中提出的单服务器计算PIR协议不是私有的,因为服务器可以在多项式时间内以很高的概率恢复所需文件的索引。攻击依赖于以下观察。删除与所需文件相对应的查询矩阵的行,将使该被打孔矩阵的行所跨越的向量空间的尺寸\(\ mathbb {F} _q \)大大减小。当删除与所请求文件无关的行时,这种尺寸损失仅以可忽略的概率出现。

更新日期:2021-03-25
down
wechat
bug