Hyang-Sook Lee ; Seongan Lim ; Ikkwon Yie ; Aaram Yun - On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols

fi:9967 - Fundamenta Informaticae, March 7, 2023, Volume 188, Issue 2
On Insecure Uses of BGN for Privacy Preserving Data Aggregation ProtocolsArticle

Authors: Hyang-Sook Lee ; Seongan Lim ; Ikkwon Yie ; Aaram Yun

    The notion of aggregator oblivious (AO) security for privacy preserving data aggregation was formalized with a specific construction of AO-secure blinding technique over a cyclic group by Shi et al. Some of proposals of data aggregation protocols use the blinding technique of Shi et al. for BGN cryptosystem, an additive homomorphic encryption. Previously, there have been some security analysis on some of BGN based data aggregation protocols in the context of integrity or authenticity of data. Even with such security analysis, the BGN cryptosystem has been a popular building block of privacy preserving data aggregation protocol. In this paper, we study the privacy issues in the blinding technique of Shi et al. used for BGN cryptosystem. We show that the blinding techniques for the BGN cryptosystem used in several protocols are not privacy preserving against the recipient, the decryptor. Our analysis is based on the fact that the BGN cryptosystem uses a pairing e:GxG-->G_T and the existence of the pairing makes the DDH problem on G easy to solve. We also suggest how to prevent such privacy leakage in the blinding technique of Shi et al. used for BGN cryptosystem.


    Volume: Volume 188, Issue 2
    Published on: March 7, 2023
    Accepted on: December 13, 2022
    Submitted on: August 25, 2022
    Keywords: Computer Science - Cryptography and Security

    Consultation statistics

    This page has been seen 135 times.
    This article's PDF has been downloaded 106 times.