A Comment on Privacy-Preserving Scalar Product Protocols as Proposed in "SPOC"

被引:6
作者
Schneider, Thomas [1 ]
Treiber, Amos [1 ]
机构
[1] Tech Univ Darmstadt, Cryptog & Privacy Engn Grp ENCRYPTO, D-64289 Darmstadt, Germany
关键词
Protocols; Privacy; Public key cryptography; Task analysis; Encryption; Privacy-preserving scalar product protocols; secure computation; oblivious transfer; EFFICIENT; FRAMEWORK; SCHEME; SECURE;
D O I
10.1109/TPDS.2019.2939313
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy-preserving scalar product (PPSP) protocols are an important building block for secure computation tasks in various applications. Lu et al. (TPDS13) introduced a PPSP protocol that does not rely on cryptographic assumptions and that is used in a wide range of publications to date. In this comment paper, we show that Lu et al.s protocol is insecure and should not be used. We describe specific attacks against it and, using impossibility results of Impagliazzo and Rudich (STOC89), show that it is inherently insecure and cannot be fixed without relying on at least some cryptographic assumptions.
引用
收藏
页码:543 / 546
页数:4
相关论文
共 27 条
[1]  
[Anonymous], 1981, TR81 HARV U
[2]  
[Anonymous], P INT C CYB SIT AW D
[3]   HOW TO EXCHANGE (SECRET) KEYS [J].
BLUM, M .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (02) :175-193
[4]   ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation [J].
Demmler, Daniel ;
Schneider, Thomas ;
Zohner, Michael .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[5]  
Goldreich O., 2009, FDN CRYPTOGRAPHY, V2
[6]   FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System [J].
Huang, Cheng ;
Lu, Rongxing ;
Zhu, Hui ;
Shao, Jun ;
Lin, Xiaodong .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :95-106
[7]  
Impagliazzo R., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P44, DOI 10.1145/73007.73012
[8]   ClaMPP: a cloud-based multi-party privacy preserving classification scheme for distributed applications [J].
Kaur, Harmanjeet ;
Kumar, Neeraj ;
Batra, Shalini .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (06) :3046-3075
[9]  
Kilian J., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P20, DOI 10.1145/62212.62215
[10]  
Lindell Y, 2017, INFORM SEC CRYPT TEX, P277, DOI 10.1007/978-3-319-57048-8_6