Data Reconstruction: When You See It and When You Don't

Edith Cohen,Haim Kaplan,Yishay Mansour,Shay Moran,Kobbi Nissim,Uri Stemmer,Eliad Tsfadia
2024-05-25
Abstract:We revisit the fundamental question of formally defining what constitutes a reconstruction attack. While often clear from the context, our exploration reveals that a precise definition is much more nuanced than it appears, to the extent that a single all-encompassing definition may not exist. Thus, we employ a different strategy and aim to "sandwich" the concept of reconstruction attacks by addressing two complementing questions: (i) What conditions guarantee that a given system is protected against such attacks? (ii) Under what circumstances does a given attack clearly indicate that a system is not protected? More specifically,
Cryptography and Security
What problem does this paper attempt to address?