eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.
You are looking at a specific version 20150508:122052 of this paper. See the latest version.

Paper 2015/083

Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes

Massimo Chenal and Qiang Tang

Abstract

A key recovery attack allows an attacker to recover the private key of an underlying encryption scheme when given a number of decryption oracle accesses. Previous research has shown that most existing Somewhat Homomorphic Encryption (SHE) schemes suffer from this attack. In this paper, we propose efficient key recovery attacks against two NTRU-based SHE schemes, which have not gained much attention in the literature. One is published by Lopez-Alt et al. at STOC conference 2012 and the other is published by Bos et al. at the IMACC conference 2013. Parallel to our work, Dahab, Galbraith and Morais have also proposed similar attacks but only for specific parameter settings at ICITS conference 2015. In comparison, our attacks apply to all parameter settings and are more efficient than theirs.

Metadata
Available format(s)
PDF
Publication info
Preprint. MAJOR revision.
Keywords
Somewhat Homomorphic EncryptionKey Recovery AttackIND-CCA1 Security.
Contact author(s)
massimo chenal @ uni lu
History
2015-05-08: last of 2 revisions
2015-02-14: received
See all versions
Short URL
https://ia.cr/2015/083
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.