Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme

被引:45
作者
Wang, Baocang [1 ,2 ]
Zhan, Yu [1 ,2 ]
Zhang, Zhili [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Guilin Univ Elect Technol, Minist Educ, Key Lab Cognit Radio & Informat Proc, Guilin 541004, Peoples R China
[3] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
基金
中国国家自然科学基金;
关键词
Continued fraction; cryptanalysis; symmetric homomorphic encryption; known-plaintext attack; COMPUTATION;
D O I
10.1109/TIFS.2018.2790916
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fully homomorphic encryption supports meaningful computations on encrypted data, and hence, is widely used in cloud computing and big data environments. Recently, Li et al. constructed an efficient symmetric fully homomorphic encryption scheme and utilized it to design a privacy-preserving-outsourced association rule mining scheme. Their proposal allows multiple data owners to jointly mine some association rules without sacrificing the data privacy. The security of the homomorphic encryption scheme against the known-plaintext attacks was established by examining the hardness of solving nonlinear systems. However, in this paper, we illustrate that the security of Li et al.' s homomorphic encryption is overvalued. First, we show that we can recover the first part of the secret key from several known plaintext/ciphertext pairs with the continued fraction algorithm. Second, we find that we can retrieve the second part of the secret key through the Euclidean algorithm for the greatest common divisor problem. Experiments on the suggested parameters demonstrate that in case of more than two homomorphic multiplications, all the secret keys of the randomly instantiated Li et al.' s encryption schemes can be very efficiently recovered, and the success probability is at least 98% for one homomorphic multiplication.
引用
收藏
页码:1460 / 1467
页数:8
相关论文
共 19 条
  • [1] [Anonymous], 1978, FDN SECURE COMPUT
  • [2] Armknecht F., 2011, 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2011), P65, DOI 10.1109/Med-Hoc-Net.2011.5970495
  • [3] Bosch Christoph, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P2694, DOI 10.1109/ICASSP.2014.6854089
  • [4] Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
  • [5] Efficient Fully Homomorphic Encryption from (Standard) LWE
    Brakerski, Zvika
    Vaikuntanathan, Vinod
    [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 97 - 106
  • [6] Chung KM, 2010, LECT NOTES COMPUT SC, V6223, P483, DOI 10.1007/978-3-642-14623-7_26
  • [7] Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
  • [8] Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
  • [9] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [10] Leveled Fully Homomorphic Signatures from Standard Lattices
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wichs, Daniel
    [J]. STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, : 469 - 477