Paper 2015/083
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
Massimo Chenal and Qiang Tang
Abstract
A key recovery attack allows an attacker to recover the private key of an underlying encryption scheme when given a number of decryption oracle accesses. Previous research has shown that most existing Somewhat Homomorphic Encryption (SHE) schemes suffer from this attack. In this paper, we propose efficient key recovery attacks against two NTRU-based SHE schemes, which have not gained much attention in the literature. One is published by Lopez-Alt et al. at STOC conference 2012 and the other is published by Bos et al. at the IMACC conference 2013. Parallel to our work, Dahab, Galbraith and Morais have also proposed similar attacks but only for specific parameter settings at ICITS conference 2015. In comparison, our attacks apply to all parameter settings and are more efficient than theirs.
Metadata
- Available format(s)
- Publication info
- Preprint. MAJOR revision.
- Keywords
- Somewhat Homomorphic EncryptionKey Recovery AttackIND-CCA1 Security.
- Contact author(s)
- massimo chenal @ uni lu
- History
- 2015-05-08: last of 2 revisions
- 2015-02-14: received
- See all versions
- Short URL
- https://ia.cr/2015/083
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/083, author = {Massimo Chenal and Qiang Tang}, title = {Key Recovery Attacks against {NTRU}-based Somewhat Homomorphic Encryption Schemes}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/083}, year = {2015}, url = {https://eprint.iacr.org/2015/083} }