Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers

被引:0
作者
Chen, Yuanmi [1 ]
Nguyen, Phong Q.
机构
[1] ENS, Dept Informat, 45 Rue Ulm, F-75005 Paris, France
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012 | 2012年 / 7237卷
关键词
RSA; FACTORIZATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At EUROCRYPT '10, van Dijk et al. presented simple fully-homomorphic encryption (FHE) schemes based on the hardness of approximate integer common divisors problems, which were introduced in 2001 by Howgrave-Graham. There are two versions for these problems: the partial version (PACD) and the general version (GACD). The seemingly easier problem PACD was recently used by Coron et al. at CRYPTO '11 to build a more efficient variant of the FHE scheme by van Dijk et al.. We present a new PACD algorithm whose running time is essentially the "square root" of that of exhaustive search, which was the best attack in practice. This allows us to experimentally break the FHE challenges proposed by Coron et al. Our PACD algorithm directly gives rise to a new GACD algorithm, which is exponentially faster than exhaustive search. Interestingly, our main technique can also be applied to other settings, such as noisy factoring and attacking low-exponent RSA.
引用
收藏
页码:502 / 519
页数:18
相关论文
共 29 条
  • [1] [Anonymous], NUMBER THEORY C LIB
  • [2] [Anonymous], PUBLIC CHALLENGES FU
  • [3] [Anonymous], 2003, Modern Computer Algebra
  • [4] Cryptanalysis of RSA with private key d less than N0.292
    Boneh, D
    Durfee, G
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1339 - 1349
  • [5] Linear recurrences with polynomial coefficients and application to integer factorization and Cartier-Manin operator
    Bostan, Alin
    Gaudry, Pierrick
    Schost, Eric
    [J]. SIAM JOURNAL ON COMPUTING, 2007, 36 (06) : 1777 - 1806
  • [6] Brakerski Z., 2011, CRYPTOLOGY EPRINT AR
  • [7] Chen YM, 2011, LECT NOTES COMPUT SC, V7073, P1, DOI 10.1007/978-3-642-25385-0_1
  • [8] Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    Coppersmith, D
    [J]. JOURNAL OF CRYPTOLOGY, 1997, 10 (04) : 233 - 260
  • [9] Coron JS, 2011, LECT NOTES COMPUT SC, V6841, P487, DOI 10.1007/978-3-642-22792-9_28
  • [10] Coron JS, 2011, LECT NOTES COMPUT SC, V6571, P147, DOI 10.1007/978-3-642-19379-8_9