Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme

被引:43
|
作者
Wang, Baocang [1 ,2 ]
Zhan, Yu [1 ,2 ]
Zhang, Zhili [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Minist Educ, Key Lab Cognit Radio & Informat Proc, Guilin 541004, Peoples R China
[3] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
基金
中国国家自然科学基金;
关键词
Continued fraction; cryptanalysis; symmetric homomorphic encryption; known-plaintext attack; COMPUTATION;
D O I
10.1109/TIFS.2018.2790916
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fully homomorphic encryption supports meaningful computations on encrypted data, and hence, is widely used in cloud computing and big data environments. Recently, Li et al. constructed an efficient symmetric fully homomorphic encryption scheme and utilized it to design a privacy-preserving-outsourced association rule mining scheme. Their proposal allows multiple data owners to jointly mine some association rules without sacrificing the data privacy. The security of the homomorphic encryption scheme against the known-plaintext attacks was established by examining the hardness of solving nonlinear systems. However, in this paper, we illustrate that the security of Li et al.' s homomorphic encryption is overvalued. First, we show that we can recover the first part of the secret key from several known plaintext/ciphertext pairs with the continued fraction algorithm. Second, we find that we can retrieve the second part of the secret key through the Euclidean algorithm for the greatest common divisor problem. Experiments on the suggested parameters demonstrate that in case of more than two homomorphic multiplications, all the secret keys of the randomly instantiated Li et al.' s encryption schemes can be very efficiently recovered, and the success probability is at least 98% for one homomorphic multiplication.
引用
收藏
页码:1460 / 1467
页数:8
相关论文
共 50 条
  • [21] Hybrid Algorithm for Symmetric Based Fully Homomorphic Encryption
    Muhammed, Kamaldeen Jimoh
    Isiaka, Rafiu Mope
    Asaju-Gbolagade, Ayisat Wuraola
    Adewole, Kayode Sakariyah
    Gbolagade, Kazeem Alagbe
    APPLIED INFORMATICS (ICAI 2021), 2021, 1455 : 377 - 390
  • [22] Symmetric quantum fully homomorphic encryption with perfect security
    Min Liang
    Quantum Information Processing, 2013, 12 : 3675 - 3687
  • [23] Fully Homomorphic Symmetric Scheme Without Bootstrapping
    Aggarwal, Nitesh
    Gupta, C. P.
    Sharma, Iti
    2014 International Conference on Cloud Computing and Internet of Things (CCIOT), 2014, : 14 - 17
  • [24] A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
    Challa, RatnaKumari
    Gunta, VijayaKumari
    BAGHDAD SCIENCE JOURNAL, 2021, 18 (02) : 899 - 906
  • [25] A Novel Fully Homomorphic Encryption Scheme Bsed on LWE
    DING Yong
    LI Xiumin
    Lü Haifeng
    LI Xinguo
    Wuhan University Journal of Natural Sciences, 2016, 21 (01) : 84 - 92
  • [26] Fully Homomorphic Encryption Scheme Based on Decomposition Ring
    Arita, Seiko
    Handa, Sari
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 195 - 211
  • [27] Optimizations of Brakerski's Fully Homomorphic Encryption Scheme
    Wu, Ting
    Wang, Hui
    Liu, You-Ping
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2000 - 2005
  • [28] A Fully Homomorphic Encryption Scheme with Better Key Size
    Chen Zhigang
    Wang Jian
    Zhang ZengNian
    Song Xinxia
    CHINA COMMUNICATIONS, 2014, 11 (09) : 82 - 92
  • [29] Review of How to Construct a Fully Homomorphic Encryption Scheme
    Chen Zhi-gang
    Wang Jian
    Chen Liqun
    Song Xin-xia
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 221 - 230
  • [30] A Fully Homomorphic Encryption Scheme With a Smaller Public Key
    Zhang, Shaomin
    Li, Kaiqiang
    Wang, Baoyi
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 762 - 767