CRYPTANALYSIS OF CHOSEN SYMMETRIC HOMOMORPHIC SCHEMES

被引:9
|
作者
Vizar, Damian [1 ]
Vaudenay, Serge [1 ]
机构
[1] EPFL IC ISC LASEC STN 14, CH-1015 Lausanne, Switzerland
关键词
Homomorphic encryption; symmetric encryption; cryptanalysis; key-recovery;
D O I
10.1556/012.2015.52.2.1311
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Since Gentry's breakthrough result was introduced in the year 2009, the homomorphic encryption has become a very popular topic. The main contribution of Gentry's thesis [5] was, that it has proven, that it actually is possible to design a fully homomorphic encryption scheme. However ground-breaking Gentry's result was, the designs, that employ the bootstrapping technique suffer from terrible performance both in key generation and homomorphic evaluation of circuits. Some authors tried to design schemes, that could evaluate homomorphic circuits of arbitrarily many inputs without need of bootstrapping. This paper introduces the notion of symmetric homomorphic encryption, and analyses the security of four such proposals, published in three different papers ([2], [7], [10]). Our result is a known plaintext key-recovery attack on every one of these schemes.
引用
收藏
页码:288 / 306
页数:19
相关论文
共 50 条
  • [1] Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme
    Wang, Baocang
    Zhan, Yu
    Zhang, Zhili
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1460 - 1467
  • [2] Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme
    Qu, Quanbo
    Wang, Baocang
    Ping, Yuan
    Zhang, Zhili
    SECURITY AND COMMUNICATION NETWORKS, 2019,
  • [3] Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem
    Sanyashi, Tikaram
    Desai, Darshil
    Menezes, Bernard
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 517 - 522
  • [4] Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
    Tsaban, Boaz
    Lifshitz, Noam
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 75 - 78
  • [5] Symmetric weak ternary quantum homomorphic encryption schemes
    Wang, Yuqi
    She, Kun
    Luo, Qingbin
    Yang, Fan
    Zhao, Chao
    MODERN PHYSICS LETTERS B, 2016, 30 (07):
  • [6] Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
    Fouque, Pierre-Alain
    Hadjibeyli, Benjamin
    Kirchner, Paul
    COMPUTING AND COMBINATORICS, COCOON 2016, 2016, 9797 : 269 - 280
  • [7] Cryptanalysis of a homomorphic encryption scheme
    Sonia Bogos
    John Gaspoz
    Serge Vaudenay
    Cryptography and Communications, 2018, 10 : 27 - 39
  • [8] Cryptanalysis of a homomorphic encryption scheme
    Bogos, Sonia
    Gaspoz, John
    Vaudenay, Serge
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 27 - 39
  • [9] On Homomorphic Encryption and Chosen-Ciphertext Security
    Hemenway, Brett
    Ostrovsky, Rafail
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 52 - 65
  • [10] Cryptanalysis Against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations
    Hosoyamada, Akinori
    Sasaki, Yu
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 198 - 218