Cryptology ePrint Archive: Report 2016/775

Cryptanalysis of a Homomorphic Encryption Scheme

Sonia Bogos and John Gaspoz and Serge Vaudenay

Abstract: Homomorphic encryption allows to make specific operations on private data which stays encrypted. While applications such as cloud computing require to have a practical solution, the encryption scheme must be secure. In this article, we detail and analyze in-depth the homomorphic encryption scheme proposed by Zhou and Wornell. From the analysis of the encryption scheme, we are able to mount three attacks. The first attack enables to recover a secret plaintext message broadcasted to multiple users. The second attack performs a chosen ciphertext key recovery attack and it was implemented and verified. The last attack is a related chosen plaintext decryption attack.

Category / Keywords: public-key cryptography /

Original Publication (with minor differences): Arcticcrypt 2016

Date: received 11 Aug 2016

Contact author: soniamihaela bogos at epfl ch

Available format(s): PDF | BibTeX Citation

Version: 20160812:173124 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]