2018
DOI: 10.1007/978-3-030-01950-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes

Abstract: Homomorphic Encryption provides one of the most promising means to delegate computation to the cloud while retaining data confidentiality. We present a plaintext recovery attack against fully homomorphic schemes which have a polynomial time distinguisher for a given fixed plaintext, and rely on the capability of homomorphically compare a pair of encrypted integer values. We improve by a constant factor the computational complexity of an exhaustive search strategy, which is linear in the recovered plaintext val… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 20 publications
(29 reference statements)
0
3
0
Order By: Relevance
“…The described properties of Lagrange interpolation allow us to use this approach to compute any function πœ‘ with π‘šπ‘–π‘› πœ‘ efficiently. The evaluation of π‘šπ‘–π‘› πœ‘ has a minimum multiplicative depth on HE schemes over a field with small characteristics (e.g., integer-based homomorphic schemes), and it includes two-variable sign and comparison functions [36], [37].…”
Section: A Lagrange Interpolationmentioning
confidence: 99%
“…The described properties of Lagrange interpolation allow us to use this approach to compute any function πœ‘ with π‘šπ‘–π‘› πœ‘ efficiently. The evaluation of π‘šπ‘–π‘› πœ‘ has a minimum multiplicative depth on HE schemes over a field with small characteristics (e.g., integer-based homomorphic schemes), and it includes two-variable sign and comparison functions [36], [37].…”
Section: A Lagrange Interpolationmentioning
confidence: 99%
“…In this section, we analyze the computational effort required by our attack for the target FHE schemes OctoM and JordanM, by estimating the constant factors (in particular, the time complexity of the 1-distinguisher T distinguisher ) in Equation 1. In addition, we show that the speed-up of our attack against the exhaustive search strategy described in Section 3 is significant for the target FHE schemes.…”
Section: Computational Complexity and Experimental Evaluationmentioning
confidence: 99%
“…Such a drawback can be overcome in an effective and elegant way if a cryptographic primitive which allows to perform computations on encrypted data, retaining the correctness of the decrypted result, is available. Such a primitive goes by the name of Fully Homomorphic Encryption (FHE), and was proposed as a pioneering A preliminary version of this paper appeared under the title "Comparison-based Attacks against Noise-free Fully Homomorphic Encryption Schemes," in Proceedings of the 20th International Conference on Information and Communications Security ICICS 2018, Lille, France, Oct. 2018 [1].…”
Section: Introductionmentioning
confidence: 99%