Paper 2016/775

Cryptanalysis of a Homomorphic Encryption Scheme

Sonia Bogos, John Gaspoz, and Serge Vaudenay


Homomorphic encryption allows to make specific operations on private data which stays encrypted. While applications such as cloud computing require to have a practical solution, the encryption scheme must be secure. In this article, we detail and analyze in-depth the homomorphic encryption scheme proposed by Zhou and Wornell. From the analysis of the encryption scheme, we are able to mount three attacks. The first attack enables to recover a secret plaintext message broadcasted to multiple users. The second attack performs a chosen ciphertext key recovery attack and it was implemented and verified. The last attack is a related chosen plaintext decryption attack.

Available format(s)
Public-key cryptography
Publication info
Published elsewhere. MINOR revision.Arcticcrypt 2016
Contact author(s)
soniamihaela bogos @ epfl ch
2016-08-12: received
Short URL
Creative Commons Attribution


      author = {Sonia Bogos and John Gaspoz and Serge Vaudenay},
      title = {Cryptanalysis of a Homomorphic Encryption Scheme},
      howpublished = {Cryptology ePrint Archive, Paper 2016/775},
      year = {2016},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.