We identify a flaw in the proof of security of Garbled Bloom Filters, a recent hash structure introduced by Dong et al. (ACM CCS 2013) that is used to design Private Set Intersection (PSI) protocols, a important family of protocols for secure cloud computing. We give counter-examples invalidating a claim that is central to the original proof and we show that variants of the GBF construction have the same issue in their security analysis. We then give a new proof of security that shows that Garbled Bloom Filters are secure nonetheless.
CITATION STYLE
Van Rompay, C., & Önen, M. (2018). Breaking and fixing the security proof of garbled bloom filters. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10980 LNCS, pp. 263–277). Springer Verlag. https://doi.org/10.1007/978-3-319-95729-6_17
Mendeley helps you to discover research relevant for your work.