Paper 2020/901
A Not-So-Trival Replay Attack Against DH-PSI
Hongrui Cui and Yu Yu
Abstract
In this short report, we present a simple yet effective inter-session replay attack against the Diffie-Hellman style private set intersection protocol (cf. [Mea86]). The attack is indistinguishable from ordinary protocol execution, and yet allows the attacker to learn the cardinality of the intersection of honest party's input sets. This kind of attack demonstrates the inadequacy of semi-honest security guarantee when facing more serious adversarial threats, and highlights the necessity for security augmentation of protocols derived from [Mea86].
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- PSIDiffie-HellmanReplay AttackConcurrent Execution
- Contact author(s)
-
rickfreeman @ sjtu edu cn
yuyuathk @ gmail com - History
- 2020-07-18: received
- Short URL
- https://ia.cr/2020/901
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/901, author = {Hongrui Cui and Yu Yu}, title = {A Not-So-Trival Replay Attack Against {DH}-{PSI}}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/901}, year = {2020}, url = {https://eprint.iacr.org/2020/901} }