首页> 外文会议>Annual International Cryptology Conference >Cryptanalysis of the Co-ACD Assumption
【24h】

Cryptanalysis of the Co-ACD Assumption

机译:Co-ACD假设的密码分析

获取原文

摘要

At ACM-CCS 2014, Cheon, Lee and Seo introduced a new number-theoretic assumption, the Co-Approximate Common Divisor (Co-ACD) assumption, based on which they constructed several cryptographic primitives, including a particularly fast additively homomorphic encryption scheme. For their proposed parameters, they found that their scheme was the "most efficient of those that support an additive homomorphic property". Unfortunately, it turns out that those parameters, originally aiming at 128-bit security, can be broken in a matter of seconds. Indeed, this paper presents several lattice-based attacks against the Cheon-Lee-Seo (CLS) homomorphic encryption scheme and of the underlying Co-ACD assumption that are effectively devastating for the proposed constructions. A few known plaintexts are sufficient to decrypt any ciphertext in the symmetric-key CLS scheme, and small messages can even be decrypted without any known plaintext at all. This breaks the security of both the symmetric-key and the public-key variants of CLS encryption as well as the underlying decisional Co-ACD assumption. Moreover, Coppersmith techniques can be used to solve the search variant of the Co-ACD problem and mount a full key recovery on the CLS scheme.
机译:在ACM-CCS 2014,Cheon,Lee和SEO推出了一种新的定理假设,基于它们构建了几个加密原语的共同近似的常见除法(Co-ACD)假设,包括特别快速的均匀加密方案。对于他们提出的参数,他们发现他们的计划是“最有效的是那些支持添加剂同源性的人”。不幸的是,事实证明,最初瞄准128位安全的那些参数可以在几秒钟内被打破。实际上,本文呈现了对Cheon-Lee-Seo(CLS)同种式加密方案的几个基于格子的攻击,以及潜在的Co-ACD假设,可有效地摧毁所提出的结构。一些已知的明文足以解密对称密钥CLS方案中的任何密文,并且甚至可以在没有任何已知的明文中解密小消息。这消除了CLS加密的对称密钥和公钥变体的安全性以及基础策略共同ACD假设。此外,COPPERSMITH技术可用于解决CO-ACD问题的搜索变体,并在CLS方案上安装完整的键恢复。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号