Cryptology ePrint Archive: Report 2020/901

A Not-So-Trival Replay Attack Against DH-PSI

Hongrui Cui and Yu Yu

Abstract: In this short report, we present a simple yet effective inter-session replay attack against the Diffie-Hellman style private set intersection protocol (cf. [Mea86]). The attack is indistinguishable from ordinary protocol execution, and yet allows the attacker to learn the cardinality of the intersection of honest party's input sets. This kind of attack demonstrates the inadequacy of semi-honest security guarantee when facing more serious adversarial threats, and highlights the necessity for security augmentation of protocols derived from [Mea86].

Category / Keywords: cryptographic protocols / PSI, Diffie-Hellman, Replay Attack, Concurrent Execution

Date: received 17 Jul 2020, last revised 18 Jul 2020

Contact author: rickfreeman at sjtu edu cn, yuyuathk@gmail com

Available format(s): PDF | BibTeX Citation

Version: 20200718:161153 (All versions of this report)

Short URL: ia.cr/2020/901


[ Cryptology ePrint archive ]