Skip to main content
Log in

On the privacy of a code-based single-server computational PIR scheme

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in [6] is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over \(\mathbb {F}_q\) of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows up with negligible probability when rows unrelated to the requested file are deleted.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Melchor, C.A., Barrier, J., Fousse, L., Killijian, M.-C.: XPIR : Private information retrieval for everyone. PoPETs 2016(2), 155–174 (2016)

    Google Scholar 

  2. Chor, B., Gilboa, N.: Computationally private information retrieval. In: Leighton, F.T., Shor, P.W. (eds.) Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997, pp 304–313. ACM (1997)

  3. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: 36th Annual Symposium on Foundations of Computer Science, Milwaukee, Wisconsin, 23-25 October 1995, pp 41–50. IEEE Computer Society (1995)

  4. Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, volume 1592 of Lecture Notes in Computer Science, pp 402–414. Springer (1999)

  5. Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp 803–815 (2005)

  6. Holzbaur, L., Hollanti, C., Wachter-Zeh, A.: Computational code-based single-server private information retrieval coRR, abs/2001.07049, 2020 Accepted to ISIT (2020)

  7. Kiayias, A., Leonardos, N., Lipmaa, H., Pavlyk, K., Tang, Q.: Optimal rate private information retrieval from homomorphic encryption. PoPETs 2015(2), 222–243 (2015)

    MATH  Google Scholar 

  8. Kushilevitz, E., Ostrovsky, R.: Replication is NOT needed: SINGLE database, computationally-private information retrieval. In: 38th Annual Symposium on Foundations of Computer Science, FOCS ’97, Miami Beach, Florida, USA, October 19-22, 1997, pp 364–373. IEEE Computer Society (1997)

  9. Lipmaa, H., Pavlyk, K.: A simpler rate-optimal CPIR protocol. In: Kiayias, A (ed.) Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected papers, volume 10322 of Lecture Notes in Computer Science, pp 621–638. Springer (2017)

  10. Yi, X., Kaosar, G, Paulet, R., Bertino, E.: Single-database private information retrieval from fully homomorphic encryption. IEEE Trans. Knowl. Data Eng. 25(5), 1125–1134 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

The first author benefits from the support of the Chair “Blockchain & B2B Platforms”, led by l’X – École Polytechnique and the Fondation de l’École Polytechnique, sponsored by Capgemini. The second author is funded by French Direction Générale l’Armement, through the Pôle d’excellence cyber.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Julien Lavauzelle.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bordage, S., Lavauzelle, J. On the privacy of a code-based single-server computational PIR scheme. Cryptogr. Commun. 13, 519–526 (2021). https://doi.org/10.1007/s12095-021-00477-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-021-00477-z

Keywords

Mathematics Subject Classification (2010)

Navigation