Paper 2024/1858

(In)Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing

Wonhee Cho, Seoul National University
Jiseung Kim, Jeonbuk National University
Changmin Lee, Korea Institute for Advanced Study
Abstract

Boneh et al. (CRYPTO'18) proposed two $t$-out-of-$N$ threshold fully homomorphic encryption ($\sf TFHE$) schemes based on Shamir secret sharing scheme and $\{0,1\}$-linear secret sharing scheme. They demonstrated the simulation security, ensuring no information leakage during partial or final decryption. This breakthrough allows any scheme to be converted into a threshold scheme by using $\sf TFHE$. We propose two polynomial time algorithms to break the simulation security of $t$-out-of-$N$ $\sf TFHE$ based on Shamir secret sharing scheme proposed by Boneh et al.. First, we show that an adversary can break the simulation security by recovering the secret key under some constraints on $t$ and $N$, which does not violate the conditions for security proof. Next, we introduce a straightforward fix that theoretically satisfies the simulation security. However, we argue that this modification remains insecure insecure when implemented with any state-of-the-art fully homomorphic encryption libraries in practice. To ensure robustness against our subsequent attacks, we recommend using an error-refreshing algorithm, such as bootstrapping or modulus switching, for each addition operation.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Threshold Fully Homomorphic EncryptionShamir secret sharing schemeCryptanalysis
Contact author(s)
wony0404 @ snu ac kr
jiseungkim @ jbnu ac kr
changminlee @ kias re kr
History
2024-11-15: approved
2024-11-14: received
See all versions
Short URL
https://ia.cr/2024/1858
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1858,
      author = {Wonhee Cho and Jiseung Kim and Changmin Lee},
      title = {(In)Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1858},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1858}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.