Paper 2020/901

A Not-So-Trival Replay Attack Against DH-PSI

Hongrui Cui and Yu Yu

Abstract

In this short report, we present a simple yet effective inter-session replay attack against the Diffie-Hellman style private set intersection protocol (cf. [Mea86]). The attack is indistinguishable from ordinary protocol execution, and yet allows the attacker to learn the cardinality of the intersection of honest party's input sets. This kind of attack demonstrates the inadequacy of semi-honest security guarantee when facing more serious adversarial threats, and highlights the necessity for security augmentation of protocols derived from [Mea86].

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
PSIDiffie-HellmanReplay AttackConcurrent Execution
Contact author(s)
rickfreeman @ sjtu edu cn
yuyuathk @ gmail com
History
2020-07-18: received
Short URL
https://ia.cr/2020/901
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/901,
      author = {Hongrui Cui and Yu Yu},
      title = {A Not-So-Trival Replay Attack Against {DH}-{PSI}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/901},
      year = {2020},
      url = {https://eprint.iacr.org/2020/901}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.