TY - CONF
T1 - Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack
AU - Babenko, M.
AU - Chervyakov, N.
AU - Tchernykh, A.
AU - Kucherov, N.
AU - Deryabin, M.
AU - Radchenko, G.
AU - Navaux, P.O.A.
AU - Svyatkin, V.
N1 - Conference code: 135266
Cited By :3
Export Date: 27 August 2021
Funding details: Russian Foundation for Basic Research, RFBR, 18-07-01224
Funding details: Council on grants of the President of the Russian Federation, MK-6294.2018.9, SP-1215.2016
Funding text 1: The work is partially supported by Russian Federation President Grant SP-1215.2016, MK-6294.2018.9, and Russian Foundation for Basic Research (RFBR) 18-07-01224.
PY - 2018
Y1 - 2018
N2 - We consider cryptosystems for homomorphic encryption schemes based on the Residue Number System (RNS) and Secret Sharing Schemes. One of their disadvantages is that they are directly related to data redundancy, and hence, increasing the size of the storage. To minimize it, homophonic encryption can be combined with the arithmetic coding known as Chinese remainder theorem. We describe a new method of cryptanalysis based on a property of RNS and theory of numbers. We prove that an attacker needs only η · [log2 log2(k · pn)l arbitrary generated input files that form the 'known-plaintext', where pi is moduli RNS, to calculate the secret key required to decrypt the entire data. © 2018 IEEE.
AB - We consider cryptosystems for homomorphic encryption schemes based on the Residue Number System (RNS) and Secret Sharing Schemes. One of their disadvantages is that they are directly related to data redundancy, and hence, increasing the size of the storage. To minimize it, homophonic encryption can be combined with the arithmetic coding known as Chinese remainder theorem. We describe a new method of cryptanalysis based on a property of RNS and theory of numbers. We prove that an attacker needs only η · [log2 log2(k · pn)l arbitrary generated input files that form the 'known-plaintext', where pi is moduli RNS, to calculate the secret key required to decrypt the entire data. © 2018 IEEE.
KW - cloud computing
KW - homomorphic encryption
KW - known-plaintext attack
KW - Cloud computing
KW - Computation theory
KW - Digital storage
KW - Number theory
KW - Numbering systems
KW - Arithmetic Coding
KW - Chinese remainder theorem
KW - Ho-momorphic encryptions
KW - Homomorphic Encryption Schemes
KW - Known-plaintext attacks
KW - Residue number system
KW - Secret sharing schemes
KW - Security analysis
KW - Cryptography
U2 - 10.1109/EIConRus.2018.8317083
DO - 10.1109/EIConRus.2018.8317083
M3 - Paper
SP - 270
EP - 274
T2 - 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering
Y2 - 29 January 2018 through 1 February 2018
ER -