Paper 2022/1679

Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting

Srinivas Vivek, IIITB
Shyam Murthy, IIITB
Deepak Kumaraswamy, National Institute of Technology Karnataka
Abstract

{We investigate the problem of recovering integer inputs (up to an affine scaling) when given only the integer monotonic polynomial outputs. Given $n$ integer outputs of a degree-$d$ integer monotonic polynomial whose coefficients and inputs are integers within known bounds and $n \gg d$, we give an algorithm to recover the polynomial and the integer inputs (up to an affine scaling). A heuristic expected time complexity analysis of our method shows that it is exponential in the size of the degree of the polynomial but polynomial in the size of the polynomial coefficients. We conduct experiments with real-world data as well as randomly chosen parameters and demonstrate the effectiveness of our algorithm over a wide range of parameters. Using only the polynomial evaluations at specific integer points, the apparent hardness of recovering the input data served as the basis of security of a recent protocol proposed by Kesarwani et al. for secure $k$-nearest neighbour computation on encrypted data that involved secure sorting. The protocol uses the outputs of randomly chosen monotonic integer polynomial to hide its inputs except to only reveal the ordering of input data. Using our integer polynomial recovery algorithm, we show that we can recover the polynomial and the inputs within a few seconds, thereby demonstrating an attack on the protocol of Kesarwani et al.

Note: The final published version of this paper appears in the Journal of Mathematical Cryptology, Volume 16 Issue 1, with DOI : 10.1515/jmc-2021-0054. An earlier version of this work was titled "Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data", and appeared in the Proceedings of 17th IMACC, 2019. The current work subsumes the earlier work and provides new results.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. Journal of Mathematical Cryptology
DOI
10.1515/jmc-2021-0054
Keywords
Polynomial Reconstruction Somewhat Homomorphic Encryption Sorting
Contact author(s)
srinivas vivek @ iiitb ac in
shyam sm @ iiitb ac in
deepakkumaraswamy99 @ gmail com
History
2022-12-03: approved
2022-12-02: received
See all versions
Short URL
https://ia.cr/2022/1679
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1679,
      author = {Srinivas Vivek and Shyam Murthy and Deepak Kumaraswamy},
      title = {Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting},
      howpublished = {Cryptology ePrint Archive, Paper 2022/1679},
      year = {2022},
      doi = {10.1515/jmc-2021-0054},
      note = {\url{https://eprint.iacr.org/2022/1679}},
      url = {https://eprint.iacr.org/2022/1679}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.