首页> 外文期刊>Computers & Security >Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
【24h】

Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes

机译:针对线性可解密完全同态加密方案的纯文本恢复攻击

获取原文
获取原文并翻译 | 示例

摘要

Homomorphic encryption primitives have the potential to be the main enabler of privacy preserving computation delegation to cloud environments. One of the strategies which has been explored to reduce their significant computational overhead with respect to cleartext computation is the one of the so-called noise-free homomorphic encryption schemes. In this work, we present an attack against fully homomorphic encryption primitives where a distinguisher for a single plaintext value exists. As our case studies, we employ two noise-free homomorphic encryption schemes where such a property holds, providing detailed attack procedure against them. We validate the effectiveness and performance of our attacks on prototype implementations of the said schemes, and suggest a countermeasure tailored to the schemes at hand. (C) 2019 Elsevier Ltd. All rights reserved.
机译:同态加密原语有可能成为隐私保护,将计算委派给云环境的主要推动者。为了减少关于明文计算的大量计算开销而探索的策略之一是所谓的无噪声同态加密方案。在这项工作中,我们提出了一种针对完全同态加密原语的攻击,其中存在单个明文值的区分符。作为我们的案例研究,我们采用了两种无噪声的同态加密方案,它们具有这样的属性,从而提供了针对它们的详细攻击程序。我们验证了针对上述方案的原型实现的攻击的有效性和性能,并提出了针对手头方案的针对性对策。 (C)2019 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号