Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack

M. Babenko, N. Chervyakov, A. Tchernykh, N. Kucherov, M. Deryabin, G. Radchenko, P.O.A. Navaux, V. Svyatkin

    Research output: Contribution to conference (No Proceedings)Paperpeer-review

    Abstract

    We consider cryptosystems for homomorphic encryption schemes based on the Residue Number System (RNS) and Secret Sharing Schemes. One of their disadvantages is that they are directly related to data redundancy, and hence, increasing the size of the storage. To minimize it, homophonic encryption can be combined with the arithmetic coding known as Chinese remainder theorem. We describe a new method of cryptanalysis based on a property of RNS and theory of numbers. We prove that an attacker needs only η · [log2 log2(k · pn)l arbitrary generated input files that form the 'known-plaintext', where pi is moduli RNS, to calculate the secret key required to decrypt the entire data. © 2018 IEEE.
    Original languageEnglish
    Pages270-274
    Number of pages5
    DOIs
    Publication statusPublished - 2018
    Event2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering - St. Petersburg Electrotechnical University “LETI”, St. Petersburg, Russian Federation
    Duration: 29 Jan 20181 Feb 2018

    Conference

    Conference2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering
    Abbreviated titleElConRus 2018
    Country/TerritoryRussian Federation
    CitySt. Petersburg
    Period29/01/181/02/18

    Keywords

    • cloud computing
    • homomorphic encryption
    • known-plaintext attack
    • Cloud computing
    • Computation theory
    • Digital storage
    • Number theory
    • Numbering systems
    • Arithmetic Coding
    • Chinese remainder theorem
    • Ho-momorphic encryptions
    • Homomorphic Encryption Schemes
    • Known-plaintext attacks
    • Residue number system
    • Secret sharing schemes
    • Security analysis
    • Cryptography

    Fingerprint

    Dive into the research topics of 'Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack'. Together they form a unique fingerprint.

    Cite this