Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem

被引:0
|
作者
Sanyashi, Tikaram [1 ]
Desai, Darshil [1 ]
Menezes, Bernard [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Mumbai, Maharashtra, India
关键词
Cloud Computing; Symmetric Key Encryption; Homomorphic Encryption; Approximate Greatest Common Divisor Problem; Lattices; Orthogonal Lattice Attack; EFFICIENT;
D O I
10.5220/0008071605170522
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Economies of scale make cloud computing an attractive option for small and medium enterprises. However, loss of data integrity or data theft remain serious concerns. Homomorphic encryption which performs computations in the encrypted domain is a possible solution to address these concerns. Many partially homomorphic encryption schemes that trade off functionality for lower storage and computation cost have been proposed. However, not all these schemes have been adequately investigated from the security perspective. This paper analyses a suite of such proposed schemes based on the hardness of the Approximate GCD problem. We show that two of these schemes are vulnerable to the Orthogonal Lattice attack. The execution time of the attack is a function of various parameters including message entropy. For the recommended set of parameters, the execution time of the attack is no greater than 1 day on a regular laptop.
引用
收藏
页码:517 / 522
页数:6
相关论文
共 50 条
  • [21] On DGHV and BGV Fully Homomorphic Encryption Schemes
    Hariss, Khalil
    Chamoun, Maroun
    Samhat, Abed Ellatif
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [22] Candidate iO from Homomorphic Encryption Schemes
    Brakerski, Zvika
    Doettling, Nico
    Garg, Sanjam
    Malavolta, Giulio
    JOURNAL OF CRYPTOLOGY, 2023, 36 (03)
  • [23] Cryptanalysis of adaptive arithmetic coding encryption schemes
    Lim, J
    Boyd, C
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 216 - 227
  • [24] A Comparison of the Homomorphic Encryption Schemes FV and YASHE
    Lepoint, Tancrede
    Naehrig, Michael
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 318 - 335
  • [25] A Survey on Homomorphic Encryption Schemes: Theory and Implementation
    Acar, Abbas
    Aksu, Hidayet
    Uluagac, A. Selcuk
    Conti, Mauro
    ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [26] Cryptanalysis of two similar chaos-based image encryption schemes
    Mastan, J. Mohamedmoideen Kader
    Pandian, R.
    CRYPTOLOGIA, 2021, 45 (06) : 541 - 552
  • [27] Candidate iO from Homomorphic Encryption Schemes
    Brakerski, Zvika
    Doettling, Nico
    Garg, Sanjam
    Malavolta, Giulio
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 79 - 109
  • [28] Fully Homomorphic Encryption Schemes: the State of The Art
    Kogos, Konstantin G.
    Filippova, Kseniia S.
    Epishkina, Anna V.
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 463 - 466
  • [29] Fast Evaluation of Homomorphic Encryption Schemes based on Ring-LWE
    Feron, Cyrielle
    Lapotre, Vianney
    Lagadec, Loic
    2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [30] Revisiting Homomorphic Encryption Schemes for Finite Fields
    Kim, Andrey
    Polyakov, Yuriy
    Zucca, Vincent
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT III, 2021, 13092 : 608 - 639