Score: 1

On the Security of a Code-Based PIR Scheme

Published: July 25, 2025 | arXiv ID: 2507.19295v1

By: Svenja Lage, Hannes Bartz

Potential Business Impact:

Find files secretly, but this way is broken.

Business Areas:
Cyber Security Information Technology, Privacy and Security

Private Information Retrieval (PIR) schemes allow clients to retrieve files from a database without disclosing the requested file's identity to the server. In the pursuit of post-quantum security, most recent PIR schemes rely on hard lattice problems. In contrast, the so called CB-cPIR scheme stands out as a pioneering effort to base PIR schemes on hard problems in coding theory, thereby contributing significantly to the diversification of security foundations. However, our research reveals a critical vulnerability in CB-cPIR, substantially diminishing its security levels. Moreover, a comparative analysis with state-of-the-art PIR schemes shows that CB-cPIR's advantages are reduced, making it less competitive in terms of the communication cost. Nevertheless, our findings highlight the importance of continued research into code-based PIR schemes, as they have the potential to provide a valuable alternative to lattice-based approaches.

Page Count
8 pages

Category
Computer Science:
Cryptography and Security