CRYPTANALYSIS OF CHOSEN SYMMETRIC HOMOMORPHIC SCHEMES

被引:9
|
作者
Vizar, Damian [1 ]
Vaudenay, Serge [1 ]
机构
[1] EPFL IC ISC LASEC STN 14, CH-1015 Lausanne, Switzerland
关键词
Homomorphic encryption; symmetric encryption; cryptanalysis; key-recovery;
D O I
10.1556/012.2015.52.2.1311
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Since Gentry's breakthrough result was introduced in the year 2009, the homomorphic encryption has become a very popular topic. The main contribution of Gentry's thesis [5] was, that it has proven, that it actually is possible to design a fully homomorphic encryption scheme. However ground-breaking Gentry's result was, the designs, that employ the bootstrapping technique suffer from terrible performance both in key generation and homomorphic evaluation of circuits. Some authors tried to design schemes, that could evaluate homomorphic circuits of arbitrarily many inputs without need of bootstrapping. This paper introduces the notion of symmetric homomorphic encryption, and analyses the security of four such proposals, published in three different papers ([2], [7], [10]). Our result is a known plaintext key-recovery attack on every one of these schemes.
引用
收藏
页码:288 / 306
页数:19
相关论文
共 50 条
  • [31] Cryptanalysis of two group signature schemes
    Joye, M
    Kim, S
    Lee, NY
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 271 - 275
  • [32] Cryptanalysis of Schemes Based on Pseudoinverse Matrix
    LIU Jinhui
    ZHANG Huanguo
    JIA Jianwei
    Wuhan University Journal of Natural Sciences, 2016, 21 (03) : 209 - 213
  • [33] Cryptanalysis of three quantum money schemes
    Bilyk, Andriyan
    Doliskani, Javad
    Gong, Zhiyong
    QUANTUM INFORMATION PROCESSING, 2023, 22 (04)
  • [34] A survey on implementations of homomorphic encryption schemes
    Thi Van Thao Doan
    Mohamed-Lamine Messai
    Gérald Gavin
    Jérôme Darmont
    The Journal of Supercomputing, 2023, 79 : 15098 - 15139
  • [35] A survey on implementations of homomorphic encryption schemes
    Doan, Thi Van Thao
    Messai, Mohamed-Lamine
    Gavin, Gerald
    Darmont, Jerome
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 15098 - 15139
  • [36] Cryptanalysis of Two Ring Signcryption Schemes
    Wang, Huaqun
    Yu, Hong
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 41 - 46
  • [37] Cryptanalysis of Some Electronic Checkbook Schemes
    Sertkaya, Isa
    Kalkar, Oznur
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 603 - 612
  • [38] Cryptanalysis on Two Certificateless Signature Schemes
    Zhang, F.
    Li, S.
    Miao, S.
    Mu, Y.
    Susilo, W.
    Huang, X.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 586 - 591
  • [40] Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers
    Karri, R
    Wu, KJ
    Mishra, P
    Kim, Y
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2002, 21 (12) : 1509 - 1517