Please report any queries concerning the funding data grouped in the sections named "Externally Awarded" or "Internally Disbursed" (shown on the profile page) to
your Research Finance Administrator. Your can find your Research Finance Administrator at https://www.ucl.ac.uk/finance/research/rs-contacts.php by entering your department
Please report any queries concerning the student data shown on the profile page to:
Email: portico-services@ucl.ac.uk
Help Desk: http://www.ucl.ac.uk/ras/portico/helpdesk
Email: portico-services@ucl.ac.uk
Help Desk: http://www.ucl.ac.uk/ras/portico/helpdesk
Publication Detail
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
-
Publication Type:Conference
-
Authors:Abadi A, Murdoch S, Zacharias T
-
Publisher:Springer
-
Publication date:02/10/2021
-
Published proceedings:Computer Security – ESORICS 2021. ESORICS 2021. Proceedings, Part II
-
Name of conference:Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security
-
Conference place:Virtual conference
-
Conference start date:04/10/2021
-
Conference finish date:08/10/2021
Abstract
Private Set Intersection protocols (PSIs) allow parties to
compute the intersection of their private sets, such that nothing about
the sets’ elements beyond the intersection is revealed. PSIs have a variety of applications, primarily in efficiently supporting data sharing in a
privacy-preserving manner. At Eurocrypt 2019, Ghosh and Nilges proposed three efficient PSIs based on the polynomial representation of sets
and proved their security against active adversaries. In this work, we
show that these three PSIs are susceptible to several serious attacks. The
attacks let an adversary (1) learn the correct intersection while making
its victim believe that the intersection is empty, (2) learn a certain element of its victim’s set beyond the intersection, and (3) delete multiple
elements of its victim’s input set. We explain why the proofs did not
identify these attacks and propose a set of mitigations.
› More search options
UCL Researchers