This website requires JavaScript.

On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols

Hyang-Sook LeeSeongan LimIkkwon YieAaram Yun
Aug 2022
摘要
The notion of aggregator oblivious (AO) security for privacy preserving dataaggregation was formalized with a specific construction of AO-secure blindingtechnique over a cyclic group by Shi et al. Some of proposals of dataaggregation protocols use the blinding technique of Shi et al. for BGNcryptosystem, an additive homomorphic encryption. Previously, there have beensome security analysis on some of BGN based data aggregation protocols in thecontext of integrity or authenticity of data. Even with such security analysis,the BGN cryptosystem has been a popular building block of privacy preservingdata aggregation protocol. In this paper, we study the privacy issues in theblinding technique of Shi et al. used for BGN cryptosystem. We show that theblinding techniques for the BGN cryptosystem used in several protocols are notprivacy preserving against the recipient, the decryptor. Our analysis is basedon the fact that the BGN cryptosystem uses a pairing e:GxG-->G_T and theexistence of the pairing makes the DDH problem on G easy to solve. We alsosuggest how to prevent such privacy leakage in the blinding technique of Shi etal. used for BGN cryptosystem.
展开全部
图表提取

暂无人提供速读十问回答

论文十问由沈向洋博士提出,鼓励大家带着这十个问题去阅读论文,用有用的信息构建认知模型。写出自己的十问回答,还有机会在当前页面展示哦。

Q1论文试图解决什么问题?
Q2这是否是一个新的问题?
Q3这篇文章要验证一个什么科学假设?
0
被引用
笔记
问答