Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme

被引:43
|
作者
Wang, Baocang [1 ,2 ]
Zhan, Yu [1 ,2 ]
Zhang, Zhili [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Minist Educ, Key Lab Cognit Radio & Informat Proc, Guilin 541004, Peoples R China
[3] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
基金
中国国家自然科学基金;
关键词
Continued fraction; cryptanalysis; symmetric homomorphic encryption; known-plaintext attack; COMPUTATION;
D O I
10.1109/TIFS.2018.2790916
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fully homomorphic encryption supports meaningful computations on encrypted data, and hence, is widely used in cloud computing and big data environments. Recently, Li et al. constructed an efficient symmetric fully homomorphic encryption scheme and utilized it to design a privacy-preserving-outsourced association rule mining scheme. Their proposal allows multiple data owners to jointly mine some association rules without sacrificing the data privacy. The security of the homomorphic encryption scheme against the known-plaintext attacks was established by examining the hardness of solving nonlinear systems. However, in this paper, we illustrate that the security of Li et al.' s homomorphic encryption is overvalued. First, we show that we can recover the first part of the secret key from several known plaintext/ciphertext pairs with the continued fraction algorithm. Second, we find that we can retrieve the second part of the secret key through the Euclidean algorithm for the greatest common divisor problem. Experiments on the suggested parameters demonstrate that in case of more than two homomorphic multiplications, all the secret keys of the randomly instantiated Li et al.' s encryption schemes can be very efficiently recovered, and the success probability is at least 98% for one homomorphic multiplication.
引用
收藏
页码:1460 / 1467
页数:8
相关论文
共 50 条
  • [1] Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme
    Qu, Quanbo
    Wang, Baocang
    Ping, Yuan
    Zhang, Zhili
    SECURITY AND COMMUNICATION NETWORKS, 2019,
  • [2] Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
    Tsaban, Boaz
    Lifshitz, Noam
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 75 - 78
  • [3] Cryptanalysis of a homomorphic encryption scheme
    Sonia Bogos
    John Gaspoz
    Serge Vaudenay
    Cryptography and Communications, 2018, 10 : 27 - 39
  • [4] Cryptanalysis of a homomorphic encryption scheme
    Bogos, Sonia
    Gaspoz, John
    Vaudenay, Serge
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 27 - 39
  • [5] Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme
    Xu, Wenju
    Zhan, Yu
    Wang, Zheng
    Wang, Baocang
    Ping, Yuan
    IEEE ACCESS, 2019, 7 : 68373 - 68379
  • [6] An efficient fully homomorphic encryption scheme
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Cherif
    International Journal of Network Security, 2019, 21 (01) : 91 - 99
  • [7] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [8] Cryptanalysis of a Homomorphic Encryption Scheme From ISIT 2008
    Bi, Jingguo
    Liu, Mingjie
    Wang, Xiaoyun
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [9] Cryptanalysis of an additively homomorphic public key encryption scheme
    Hong, Zhiyong
    Zhou, Liguo
    Zhan, Yu
    Liu, Chengdong
    Wang, Baocang
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [10] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141