Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme

نویسندگان

  • Boaz Tsaban
  • Noam Lifshitz
چکیده

The fully homomorphic symmetric encryption scheme MORE encrypts keys by conjugation with a random invertible matrix over an RSA modulus. We provide a two known-ciphertexts cryptanalysis recovering a linear dependence among the two encrypted keys. 1. The FHE scheme MORE In their paper [1], Kipnis and Hibshoosh propose, among other things, to use the following type of fully homomorphic encryption (FHE) of keys, which they named Matrix Operation for Randomization or Encryption (MORE). Let N be an RSA modulus. The secret key is an invertible matrix A ∈ GL2(ZN). The scheme only encrypts random elements k ∈ ZN , and is constrained not to encrypt the same element twice. The encryption is randomized. To encrypt a key k, choose a random secret s ∈ ZN , and output EA(k) := A −1 ( s 0 0 k ) A. To decrypt, conjugate by A−1 instead of A. It is immediate that this is a fully homomorphic function of k. This scheme is proved to be secure in the sense that, given encryptions of uniformly random, independent keys k1, . . . , kn, for arbitrary n, one can learn nothing about the key k1 [1, page 12]. A second FHE proposed in [1], Polynomial Operation for Randomization or Encryption (PORE), is shown there to be equivalent to MORE. An application to signatures is provided in [1], but Hibshoosh reported to us that this specific application has in the meanwhile been cryptanalyzed. 2. Cryptanalysis of MORE We do not invalidate the Kipnis-Hibshoosh proof of security. But we identify another potential problem with improper uses of this scheme. 1 2 BOAZ TSABAN AND NOAM LIFSHITZ Lemma 2.1. A 2 × 2 matrix commutes with all diagonal matrices if an only if it is diagonal. Proof. It is necessary that C commutes with the basis matrix E11, which implies that the off-diagonal entries of C are 0. Thus, C is diagonal. Being diagonal is also sufficient for C commuting with all diagonal matrices. Lemma 2.2. Each matrix A with nonzero diagonal entries is of the form ( a 0 0 d )( 1 ∗ ∗ 1 ) . Proof. We have that ( a b c d ) = ( a 0 0 d )( 1 b/a c/d 1 ) . The cryptanalysis. Let A be the secret matrix. We may assume that the diagonal entries of A are nonzero, and thus write

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Chosen Symmetric Homomorphic Schemes

Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryption has become a very popular topic. The main contribution of Gentry’s thesis [9] was, that it has proven, that it actually is possible to design a fully homomorphic encryption scheme. However ground-breaking Gentry’s result was, the designs, that employ the bootstrapping technique suffer from terrible pe...

متن کامل

Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme

Recently, Brenner et al. proposed a symmetric somewhat homomorphic encryption scheme and applied it to solve some practical problems, such as the Millionaires’ problem, which only need to evaluate circuits of limited depth. It is claimed that the security of their scheme is built on the hardness of integer factorization. In this paper, we use the Euclidean Greatest Common Divisor (GCD) algorith...

متن کامل

Cryptanalysis of the Co-ACD Assumption

At ACM-CCS 2014, Cheon, Lee and Seo introduced a new number-theoretic assumption, the Co-Approximate Common Divisor (CoACD) assumption, based on which they constructed several cryptographic primitives, including a particularly fast additively homomorphic encryption scheme. For their proposed parameters, they found that their scheme was the “most efficient of those that support an additive homom...

متن کامل

Quantum fully homomorphic encryption scheme based on universal quantum circuit

Fully homomorphic encryption enables arbitrary computation on encrypted data without decrypting the data. Here it is studied in the context of quantum information processing. Based on universal quantum circuit, we present a quantum fully homomorphic encryption (QFHE) scheme, which permits arbitrary quantum transformation on an encrypted data. The QFHE scheme is proved to be perfectly secure. In...

متن کامل

Noiseless Fully Homomorphic Encryption

We try to propose two fully homomorphic encryption (FHE) schemes, one for symmetric (aka. secret-key) settings and another under asymmetric (aka. public-key) scenario. The presented schemes are noiseless in the sense that there is no “noise” factor contained in the ciphertexts. Or equivalently, before performing fully homomorphic computations, our schemes do not incorporate any noise-control pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Mathematical Cryptology

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014