Paper 2023/561

vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks

Bhuvnesh Chaturvedi, Indian Institute of Technology Kharagpur
Anirban Chakraborty, Max Planck Institute for Security and Privacy
Ayantika Chatterjee, Indian Institute of Technology Kharagpur
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur
Abstract

Fully Homomorphic Encryption (FHE) inherently lacks data integrity mechanisms, allowing a malicious server to arbitrarily tamper with the data associated with FHE computations on its end. A series of works named reaction attacks further demonstrates that a malicious server can exploit this lack of integrity checks to carry out interactive full-key recovery attacks on state-of-the-art FHE schemes. In this paper, we propose an efficient solution to this problem by utilizing the concept of the Merkle tree. Our solution uses cryptographic hash functions to ensure the integrity of data involved in FHE computations. The efficiency of our solution comes from the lower sizes and ease of computations of the hash values, which subsequently leads to a reduction in both the network and computation overhead. Given that protecting the entire FHE circuit can lead to tremendous network overhead, we further perform scheme-specific optimizations by identifying a small portion of the FHE circuit, protecting which is sufficient to thwart these reaction-based attacks. Finally, we propose a framework that evaluates different FHE schemes based on the overhead that will be incurred when protecting these schemes through our solution. Our framework can be leveraged by application developers to choose an optimal FHE scheme in terms of both performance and overhead.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
FHEIND-CVAReaction AttackFull Key RecoveryApplication Level SecurityMerkle tree
Contact author(s)
bhuvneshchaturvedi2512 @ gmail com
ch anirban00727 @ gmail com
cayantika @ gmail com
debdeep mukhopadhyay @ gmail com
History
2025-07-05: last of 2 revisions
2023-04-20: received
See all versions
Short URL
https://ia.cr/2023/561
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/561,
      author = {Bhuvnesh Chaturvedi and Anirban Chakraborty and Ayantika Chatterjee and Debdeep Mukhopadhyay},
      title = {vr$^2${FHE}- Securing {FHE} from Reaction-based Key Recovery Attacks},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/561},
      year = {2023},
      url = {https://eprint.iacr.org/2023/561}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.