Paper 2015/083

Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes

Massimo Chenal and Qiang Tang

Abstract

A key recovery attack allows an attacker to recover the private key of an underlying encryption scheme when given a number of decryption oracle accesses. Previous research has shown that most existing Somewhat Homomorphic Encryption (SHE) schemes suffer from this attack. In this paper, we propose efficient key recovery attacks against two NTRU-based SHE schemes, which have not gained much attention in the literature. One is published by Lopez-Alt et al. at STOC conference 2012 and the other is published by Bos et al. at the IMACC conference 2013. Parallel to our work, Dahab, Galbraith and Morais have also proposed similar attacks but only for specific parameter settings at ICITS conference 2015. In comparison, our attacks apply to all parameter settings and are more efficient than theirs.

Metadata
Available format(s)
PDF
Publication info
Preprint. MAJOR revision.
Keywords
Somewhat Homomorphic EncryptionKey Recovery AttackIND-CCA1 Security.
Contact author(s)
massimo chenal @ uni lu
History
2015-05-08: last of 2 revisions
2015-02-14: received
See all versions
Short URL
https://ia.cr/2015/083
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/083,
      author = {Massimo Chenal and Qiang Tang},
      title = {Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes},
      howpublished = {Cryptology ePrint Archive, Paper 2015/083},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/083}},
      url = {https://eprint.iacr.org/2015/083}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.