Review the Cuckoo Hash-Based Unbalanced Private Set Union: Leakage, Fix, and Optimization

被引:0
|
作者
Liu, Keyang [1 ]
Li, Xingxin [1 ]
Takagi, Tsuyoshi [1 ]
机构
[1] Univ Tokyo, Tokyo, Japan
来源
基金
奥地利科学基金会;
关键词
unbalanced private set union; privacy leakage; cuckoo hash; reversed private membership tests;
D O I
10.1007/978-3-031-70890-9_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A Private Set Union (PSU) protocol involves two participants-the sender and receiver-computing the union of their privately held sets, X and Y, and outputs the result to the receiver. PSU protocols are categorized into balanced (vertical bar X vertical bar approximate to vertical bar Y vertical bar) and unbalanced (vertical bar X vertical bar << vertical bar Y vertical bar or vertical bar X vertical bar >> vertical bar Y vertical bar) settings. Tu et al. (CCS 2023) developed the first efficient unbalanced PSU (vertical bar X vertical bar << vertical bar Y vertical bar) protocol using cuckoo hashing and a novel permuted Reversed Private Membership Test. In this paper, we reassess Tu et al.'s protocol and present a statistical and computational leakage attack targeting their Hash + RPMT framework. We estimate the lower bound of our attack's success probability and highlight how Tu's parameter choices lead to leaks. To counter these vulnerabilities, we offer two mitigation strategies with different trade-offs. Finally, we optimize the p-RPMT protocol by introducing a new shuffled-PMT (s-PMT), which eliminates one permutation round at no extra cost.
引用
收藏
页码:331 / 352
页数:22
相关论文
共 28 条
  • [1] Faster Hash-Based Signatures with Bounded Leakage
    Eisenbarth, Thomas
    von Maurich, Ingo
    Ye, Xin
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 223 - 243
  • [2] Global Optimization for Hash-based Splitting
    Medagliani, Paolo
    Leguay, Jeremie
    Abdullah, Mohammed
    Leconte, Mathieu
    Paris, Stefano
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [3] An efficient hash-based method for discovering the maximal frequent set
    Yang, DL
    Pan, CT
    Chung, YC
    25TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE, 2001, : 511 - 516
  • [4] Approximate Hash-Based Set Reconciliation for Distributed Replica Repair
    Kruber, Nico
    Lange, Maik
    Schintke, Florian
    2015 IEEE 34TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2015, : 166 - 175
  • [5] Fast Unbalanced Private Set Union from Fully Homomorphic Encryption
    Tu, Binbin
    Chen, Yu
    Liu, Qi
    Zhang, Cong
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2959 - 2973
  • [6] Review and analysis of classical algorithms and hash-based post-quantum algorithm
    Noel M.D.
    Waziri V.O.
    Abdulhamid S.M.
    Ojeniyi J.A.
    Journal of Reliable Intelligent Environments, 2022, 8 (04) : 397 - 414
  • [7] A High Throughput and Energy Efficient Lepton Hardware Encoder With Hash-Based Memory Optimization
    Yan, Xiao
    Di, Zhixiong
    Huang, Bowen
    Li, Minjiang
    Wang, Wenqiang
    Zeng, Xiaoyang
    Fan, Yibo
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (07) : 4680 - 4695
  • [8] Card-Based Protocols for Private Set Intersection and Union
    Doi, Anastasiia
    Ono, Tomoki
    Abe, Yoshiki
    Nakai, Takeshi
    Shinagawa, Kazumasa
    Watanabe, Yohei
    Nuida, Koji
    Iwamoto, Mitsugu
    NEW GENERATION COMPUTING, 2024, 42 (03) : 359 - 380
  • [9] A More Efficient Private Set Intersection Protocol based on Random OT and Balance hash
    Shen, Liyan
    Chen, Xiaojun
    Shi, Jinqiao
    Fang, Binxing
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [10] Rough Cuckoo Search: A Novel Mathematics Based Optimization Approach Based on Rough Set
    Swarnajit Ray
    Krishna Gopal Dhal
    Prabir Kumar Naskar
    Pattern Recognition and Image Analysis, 2022, 32 : 228 - 247