Cryptanalysis of a Lattice-Based PIR Scheme for Arbitrary Database Sizes
By: Svenja Lage
Potential Business Impact:
Breaks secret codes that hide what you're looking for.
Private Information Retrieval (PIR) schemes enable users to securely retrieve files from a server without disclosing the content of their queries, thereby preserving their privacy. In 2008, Melchor and Gaborit proposed a PIR scheme that achieves a balance between communication overhead and server-side computational cost. However, for particularly small databases, Liu and Bi identified a vulnerability in the scheme using lattice-based methods. Nevertheless, the rapid increase in computational cost associated with the attack limited its practical applicability, leaving the scheme's overall security largely intact. In this paper, we present a novel two-stage attack that extends the work of Liu and Bi to databases of arbitrary sizes. To this end, we employ a binary-search-like preprocessing technique, which enables a significant reduction in the number of lattice problems that need to be considered. Specifically, we demonstrate how to compromise the scheme in a matter of minutes using an ordinary laptop. Our findings are substantiated through both rigorous analytical proofs and comprehensive numerical experiments.
Similar Papers
On the Security of a Code-Based PIR Scheme
Cryptography and Security
Find files secretly, but this way is broken.
CB-cPIR: Code-Based Computational Private Information Retrieval
Information Retrieval
Keeps your secret internet searches private.
A Low-Complexity Scheme for Multi-Message Private Information Retrieval
Information Theory
Keeps your secret internet searches private.