Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem

被引:0
|
作者
Sanyashi, Tikaram [1 ]
Desai, Darshil [1 ]
Menezes, Bernard [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Mumbai, Maharashtra, India
关键词
Cloud Computing; Symmetric Key Encryption; Homomorphic Encryption; Approximate Greatest Common Divisor Problem; Lattices; Orthogonal Lattice Attack; EFFICIENT;
D O I
10.5220/0008071605170522
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Economies of scale make cloud computing an attractive option for small and medium enterprises. However, loss of data integrity or data theft remain serious concerns. Homomorphic encryption which performs computations in the encrypted domain is a possible solution to address these concerns. Many partially homomorphic encryption schemes that trade off functionality for lower storage and computation cost have been proposed. However, not all these schemes have been adequately investigated from the security perspective. This paper analyses a suite of such proposed schemes based on the hardness of the Approximate GCD problem. We show that two of these schemes are vulnerable to the Orthogonal Lattice attack. The execution time of the attack is a function of various parameters including message entropy. For the recommended set of parameters, the execution time of the attack is no greater than 1 day on a regular laptop.
引用
收藏
页码:517 / 522
页数:6
相关论文
共 50 条
  • [1] Cryptanalysis of a homomorphic encryption scheme
    Sonia Bogos
    John Gaspoz
    Serge Vaudenay
    Cryptography and Communications, 2018, 10 : 27 - 39
  • [2] Cryptanalysis of a homomorphic encryption scheme
    Bogos, Sonia
    Gaspoz, John
    Vaudenay, Serge
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 27 - 39
  • [3] CRYPTANALYSIS OF CHOSEN SYMMETRIC HOMOMORPHIC SCHEMES
    Vizar, Damian
    Vaudenay, Serge
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2015, 52 (02) : 288 - 306
  • [4] Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme
    Wang, Baocang
    Zhan, Yu
    Zhang, Zhili
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1460 - 1467
  • [5] k-Lin-based Homomorphic Encryption Schemes
    Lai J.-Z.
    Huang Z.-A.
    Weng J.
    Wu Y.-D.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (02): : 802 - 817
  • [6] Cryptanalysis of an additively homomorphic public key encryption scheme
    Hong, Zhiyong
    Zhou, Liguo
    Zhan, Yu
    Liu, Chengdong
    Wang, Baocang
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [7] Cryptanalysis of a Homomorphic Encryption Scheme From ISIT 2008
    Bi, Jingguo
    Liu, Mingjie
    Wang, Xiaoyun
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [8] Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme
    Qu, Quanbo
    Wang, Baocang
    Ping, Yuan
    Zhang, Zhili
    SECURITY AND COMMUNICATION NETWORKS, 2019,
  • [9] Cryptanalysis of some multimedia encryption schemes
    Jakimoski, Goce
    Subbalakshmi, K. P.
    IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (03) : 330 - 338
  • [10] A survey on implementations of homomorphic encryption schemes
    Thi Van Thao Doan
    Mohamed-Lamine Messai
    Gérald Gavin
    Jérôme Darmont
    The Journal of Supercomputing, 2023, 79 : 15098 - 15139