Paper 2024/1901
On the Insecurity of Bloom Filter-Based Private Set Intersections
Abstract
Private set intersections are cryptographic protocols that compute the intersection of multiple parties' private sets without revealing elements that are not in the intersection. These protocols become less efficient when the number of parties grows, or the size of the sets increases. For this reason, many protocols are based on Bloom filters, which speed up the protocol by approximating the intersections, introducing false positives with a small but non-negligible probability. These false positives are caused by hash collisions in the hash functions that parties use to encode their sets as Bloom filters. In this work, we show that these false positives are more than an inaccuracy: an adversary in the augmented semi-honest model can use them to learn information about elements that are not in the intersection. First, we show that existing security proofs for Bloom filter-based private set intersections are flawed. Second, we show that even in the most optimistic setting, Bloom filter-based private set intersections cannot securely realize an approximate private set intersection unless the parameters are so large that false positives only occur with negligible probability. Third, we propose a practical attack that allows a party to learn if an element is contained in a victim's private set, showing that the problem with Bloom filters is not just theoretical. We conclude that the efficiency gain of using Bloom filters as an approximation in existing protocols vanishes when accounting for this security problem. We propose three mitigations besides choosing larger parameters: One can use oblivious pseudo-random functions instead of hash functions to reduce the success rate of our attack significantly, or replace them with password-based key derivation functions to significantly slow down attackers. A third option is to let a third party authorize the input sets before proceeding with the protocol.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- bloom filterprobabilistic data structuresprivate set intersectionPSIMPSI
- Contact author(s)
-
J V Vos @ tudelft nl
T O Koster @ tudelft nl
E A Markatou @ tudelft nl
Z Erkin @ tudelft nl - History
- 2024-11-25: approved
- 2024-11-22: received
- See all versions
- Short URL
- https://ia.cr/2024/1901
- License
-
CC BY-NC-ND
BibTeX
@misc{cryptoeprint:2024/1901, author = {Jelle Vos and Jorrit van Assen and Tjitske Koster and Evangelia Anna Markatou and Zekeriya Erkin}, title = {On the Insecurity of Bloom Filter-Based Private Set Intersections}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1901}, year = {2024}, url = {https://eprint.iacr.org/2024/1901} }