Cryptology ePrint Archive: Report 2016/775
Cryptanalysis of a Homomorphic Encryption Scheme
Sonia Bogos and John Gaspoz and Serge Vaudenay
Abstract: Homomorphic encryption allows to make specific operations on private data which stays encrypted.
While applications such as cloud computing require to have a practical solution, the encryption scheme must be secure. In this article, we detail and analyze in-depth the homomorphic encryption scheme proposed by Zhou and Wornell. From the analysis of the encryption scheme, we are able to mount three attacks. The first attack enables to recover a secret plaintext message broadcasted to multiple users. The second attack performs a chosen ciphertext key recovery attack and it was implemented and verified. The last attack is a related chosen plaintext decryption attack.
Category / Keywords: public-key cryptography /
Original Publication (with minor differences): Arcticcrypt 2016
Date: received 11 Aug 2016
Contact author: soniamihaela bogos at epfl ch
Available format(s): PDF | BibTeX Citation
Version: 20160812:173124 (All versions of this report)
Short URL: ia.cr/2016/775
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]