Abstract
In this paper we examine the first working implementation of a fully homomorphic scheme from C.Gentry and S.Halevi. We implemented the ciphertext-only attack from [2] using the NTL library and show that only dimensions up to 128 are feasible for common computational power. We propose also two improvements of this attack that enable us to use the fastest variant of LLL from NTL and compare the results.
This work was supported by the grant APVV-0586-11.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gu, C.: New Fully Homomorphic Encryption over the Integers. Cryptology ePrint Archive, Report 2011/118, (September 21, 2011), http://eprint.iacr.org/2011/118
Gu, C.: Cryptanalysis of the Smart-Vercauteren and Gentry-Halevis Fully Homomorphic Encryption. IACR Cryptology ePrint Archive 2011: 328 (2011)
Gu, C.: Personal Communication (2012)
Coron, J.S., Naccache, D., Tibouchi, M.: Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. Cryptology ePrint Archive, Report 2011/440 (2011), http://eprint.iacr.org/2011/440 (July 29, 2012)
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully Homomorphic Encryption over the Integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC 2009), Bethesda, USA, pp. 169–178 (2009)
Gentry, C.: A fully homomorphic encryption scheme. Dissertation Thesis, Stanford University (September 2009)
Gentry, C., Halevi, S.: Implementing Gentry’s Fully-Homomorphic Encryption Scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)
Goldreich, O., Goldwasser, S., Halevi, S.: Public-Key Cryptosystems from Lattice Reduction Problems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 112–131. Springer, Heidelberg (1997)
Lenstra, A., Lenstra, H., Lovasz, L.: Factoring polynomials with rational coefficients. Mathematische Annalen 4, 515–534 (1982)
Loftus, C., May, A., Smart, N.P., Vercauteren, F.: On CCA-Secure Fully Homomorphic Encryption. Cryptology ePrint Archive, Report 2010/560 (2010), http://eprint.iacr.org/2010/560 (September 21, 2011)
Micciancio, D.: The shortest vector problem is NP-hard to approximate to within some constant. SIAM Journal on Computing 30(6), 2008–2035 (2001)
Nguyen, P.Q., Valée, B.: LLL algorithm, Survey and Applications. Springer (2010)
Rappe, D.K.: Homomorphic cryptosystems and their applications. PhD Thesis, University of Dortmund, Dortmund, Germany (2004)
Shoup, V.: A library for doing Number Theory, v.5.5.2. New York University, New York (July, 29, 2012), http://shoup.net/ntl/
Schmidt, P.: Fully Homomorphic Encryption - Overview and Cryptanalysis. Diploma Thesis, University of Dortmund, Dortmund, Germany (2011)
Schnorr, C.P.: Block reduced lattice bases and successive minima. Combinatorics, Probability & Computing 3, 507–552 (1994)
Schnorr, C.P., Euchner, M.: Lattice basis reduction: Improved practical algorithms and solving subset sum problems. Mathematical Programming 66, 181–199 (1994)
Smart, N.P.,Vercauteren, F.: Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. Cryptology ePrint Archive, Report 2009/571 (2009), http://eprint.iacr.org/2009/571 (September 21, 2011)
Stehlé, D., Steinfeld, R.: Faster Fully Homomorphic Encryption. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 377–394. Springer, Heidelberg (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mikuš, M., Sýs, M. (2013). Ciphertext-Only Attack on Gentry-Halevi Implementation of Somewhat Homomorphic Scheme. In: Kučera, A., Henzinger, T.A., Nešetřil, J., Vojnar, T., Antoš, D. (eds) Mathematical and Engineering Methods in Computer Science. MEMICS 2012. Lecture Notes in Computer Science, vol 7721. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36046-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-36046-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36044-2
Online ISBN: 978-3-642-36046-6
eBook Packages: Computer ScienceComputer Science (R0)