Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme

被引:43
|
作者
Wang, Baocang [1 ,2 ]
Zhan, Yu [1 ,2 ]
Zhang, Zhili [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Minist Educ, Key Lab Cognit Radio & Informat Proc, Guilin 541004, Peoples R China
[3] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
基金
中国国家自然科学基金;
关键词
Continued fraction; cryptanalysis; symmetric homomorphic encryption; known-plaintext attack; COMPUTATION;
D O I
10.1109/TIFS.2018.2790916
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fully homomorphic encryption supports meaningful computations on encrypted data, and hence, is widely used in cloud computing and big data environments. Recently, Li et al. constructed an efficient symmetric fully homomorphic encryption scheme and utilized it to design a privacy-preserving-outsourced association rule mining scheme. Their proposal allows multiple data owners to jointly mine some association rules without sacrificing the data privacy. The security of the homomorphic encryption scheme against the known-plaintext attacks was established by examining the hardness of solving nonlinear systems. However, in this paper, we illustrate that the security of Li et al.' s homomorphic encryption is overvalued. First, we show that we can recover the first part of the secret key from several known plaintext/ciphertext pairs with the continued fraction algorithm. Second, we find that we can retrieve the second part of the secret key through the Euclidean algorithm for the greatest common divisor problem. Experiments on the suggested parameters demonstrate that in case of more than two homomorphic multiplications, all the secret keys of the randomly instantiated Li et al.' s encryption schemes can be very efficiently recovered, and the success probability is at least 98% for one homomorphic multiplication.
引用
收藏
页码:1460 / 1467
页数:8
相关论文
共 50 条
  • [31] A key recovery attack on Fully Homomorphic Encryption scheme
    Guang, Yan
    Zhu, Yue-Fei
    Gu, Chun-Xiang
    Zheng, Yong-Hui
    Tang, Quan-You
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (12): : 2999 - 3004
  • [32] A Faster Fully Homomorphic Encryption Scheme in Big Data
    Wang, Dan
    Guo, Bing
    Shen, Yan
    Cheng, Shun-Jun
    Lin, Yong-Hong
    2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2017, : 350 - 354
  • [33] A lightweight fully homomorphic encryption scheme for cloud security
    Biksham, V.
    Vasumathi, D.
    International Journal of Information and Computer Security, 2020, 13 (3-4) : 357 - 371
  • [34] New Fully Homomorphic Encryption Scheme Based On Multistage Partial Homomorphic Encryption Applied In Cloud Computing
    Mahmood, Zainab Hikmat
    Ibrahem, Mahmood Khalel
    2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 182 - 186
  • [35] Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Xie, Run
    Zhao, Jining
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 180 - 186
  • [36] A multi-valued quantum fully homomorphic encryption scheme
    Zhang, Yuanjing
    Shang, Tao
    Liu, Jianwei
    QUANTUM INFORMATION PROCESSING, 2021, 20 (03)
  • [37] Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption
    Mohammed, Mohammed A.
    Abed, Fadhil S.
    ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2020, 8 (02): : 40 - 47
  • [38] Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
    Kuang, Liwei
    Yang, Laurence T.
    Feng, Jun
    Dong, Mianxiong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (03) : 868 - 878
  • [39] Multiple to One Fully Homomorphic Encryption Scheme over the Integers
    Wang Caifen
    Cheng Yudan
    Liu Chao
    Zhao Bing
    Xu Qinbai
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (09) : 2119 - 2126
  • [40] A Fully Homomorphic Encryption Scheme over Finite Prime Field
    Bai, Liwang
    Zhao, Qiqi
    Lan, Yuqing
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 610 - 618