2020
DOI: 10.48550/arxiv.2004.00509
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

On the privacy of a code-based single-server computational PIR scheme

Abstract: We show that the single-server computational PIR protocol proposed by Holzbaur, Hollanti and Wachter-Zeh in [HHW20] is not private, in the sense that the server can recover in polynomial time the index of the desired file with very high probability. The attack relies on the following observation. Removing rows of the query matrix corresponding to the desired file yields a large decrease of the dimension over F q of the vector space spanned by the rows of this punctured matrix. Such a dimension loss only shows … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…In this PIR scheme the authors consider the field extension F q m and secretly choose a partition of the basis over F q . Shortly after, this proposal has been attacked in [6], using that the removal of one row within the query matrix and checking for the dimension of the rest reveals the position of the desired file.…”
Section: Hhwz Pir Schemementioning
confidence: 99%
See 3 more Smart Citations
“…In this PIR scheme the authors consider the field extension F q m and secretly choose a partition of the basis over F q . Shortly after, this proposal has been attacked in [6], using that the removal of one row within the query matrix and checking for the dimension of the rest reveals the position of the desired file.…”
Section: Hhwz Pir Schemementioning
confidence: 99%
“…In the following, we describe this PIR scheme presented in [13] with respect to our code-based framework. Later, we also present the attack [6] in terms of solving the distinguishability problem.…”
Section: Hhwz Pir Schemementioning
confidence: 99%
See 2 more Smart Citations
“…PIR schemes with colluding servers for coded databases from general linear codes over small fields are considered in [19,20,28,30,31]. We refer to [9,18,23,25,27,29,42,43,46] for the recent related development and [45] for a nice survey of active research on private retrieval, computing and learning.…”
Section: Introductionmentioning
confidence: 99%