[Resource Topic] 2020/901: A Not-So-Trival Replay Attack Against DH-PSI

Welcome to the resource topic for 2020/901

A Not-So-Trival Replay Attack Against DH-PSI

Authors: Hongrui Cui, Yu Yu


In this short report, we present a simple yet effective inter-session replay attack against the Diffie-Hellman style private set intersection protocol (cf. [Mea86]). The attack is indistinguishable from ordinary protocol execution, and yet allows the attacker to learn the cardinality of the intersection of honest party’s input sets. This kind of attack demonstrates the inadequacy of semi-honest security guarantee when facing more serious adversarial threats, and highlights the necessity for security augmentation of protocols derived from [Mea86].

ePrint: https://eprint.iacr.org/2020/901

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .