Proceedings of the International Conference on Health Informatics 2015
DOI: 10.5220/0005176000050013
|View full text |Cite
|
Sign up to set email alerts
|

Automated Cryptanalysis of Bloom Filter Encryptions of Health Records

Abstract: Privacy-preserving record linkage with Bloom filters has become increasingly popular in medical applications, since Bloom filters allow for probabilistic linkage of sensitive personal data. However, since evidence indicates that Bloom filters lack sufficiently high security where strong security guarantees are required, several suggestions for their improvement have been made in literature. One of those improvements proposes the storage of several identifiers in one single Bloom filter. In this paper we presen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Applying the decoding algorithms described by Niedermeyer [21] and modified by [22], yielded no successful decoding of bit patterns for any of the newly suggested encoding methods described here. Although random hashing by itself prevents the Niedermeyer attack, a combination of random hashing with balancing codes prohibits any attack based on Hamming weights, including attacks that are -to date -unknown.…”
Section: Discussionmentioning
confidence: 88%
See 2 more Smart Citations
“…Applying the decoding algorithms described by Niedermeyer [21] and modified by [22], yielded no successful decoding of bit patterns for any of the newly suggested encoding methods described here. Although random hashing by itself prevents the Niedermeyer attack, a combination of random hashing with balancing codes prohibits any attack based on Hamming weights, including attacks that are -to date -unknown.…”
Section: Discussionmentioning
confidence: 88%
“…Any of the methods tested here detected 90-95% of all true record pairs with F-scores between 0.947 to 0.969. Table I presents the decoding rates for each variation using the attack by [22], privacy metrics, entropy, and number of unique bit patterns in the data.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…[3,4,20]. Additionally, several hardening techniques for BFs are sugested in [10,21], such as salting, noise injection, and a random selection of hash functions. Some of which are useful to improve our approach's security.…”
Section: Bloom Filter Hardeningmentioning
confidence: 99%
“…Using this idea, [44] demonstrated a manual attack on double hashing-based Bloom filters resulting in a near complete reidentification of all records. This kind of attack has been used by [46] for attacking double hashing based combined Bloom filter (CLKs).…”
Section: A Security Of Bloom Filter-based Approachesmentioning
confidence: 99%