Plaintext recovery attacks and their mitigation in an application-specific SHE scheme

Tikaram Sanyashi, Anasuya Acharya, Bernard Menezes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In addition to storage and computing power, cloud providers ensure confidentiality of user data through the use of various encryption technologies. The need to decrypt the data before it can be operated upon exposes a possible security hole which could be exploited by untrustworthy system administrators. Homomorphic encryption allows operations on encrypted data without the need to first decrypt it making it attractive for cloud computing. However, it incurs significant overhead of storage and computation and is therefore infeasible in practice. Somewhat homomorphic schemes have been proposed to handle specific applications - one such scheme, the Zhou Wornell Scheme, operates on vectors of integers. We demonstrate that this scheme is vulnerable to plaintext recovery attacks for a range of vector sizes. We explore the trade-offs between plaintext vector length, public key size and security. Increasing vector length increases security but at the cost of greatly increased public key size. We suggest a way of reducing the size of the public key by up to 90%. Finally, we propose a variant of this scheme which is secure against plaintext recovery attacks.

Original languageEnglish
Title of host publicationProceedings - 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019
EditorsHui Tian, Hong Shen, Wee Lum Tan
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages69-74
Number of pages6
ISBN (Electronic)9781728126166
DOIs
StatePublished - Dec 2019
Externally publishedYes
Event20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019 - Gold Coast, Australia
Duration: 5 Dec 20197 Dec 2019

Publication series

NameProceedings - 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019

Conference

Conference20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019
Country/TerritoryAustralia
CityGold Coast
Period5/12/197/12/19

Bibliographical note

Publisher Copyright:
© 2019 IEEE.

Keywords

  • Babai's algorithm
  • Closest vector problem (CVP)
  • Cloud computing
  • Homomorphic encryption
  • Lattice reduction
  • Learning with errors (LWE)

Fingerprint

Dive into the research topics of 'Plaintext recovery attacks and their mitigation in an application-specific SHE scheme'. Together they form a unique fingerprint.

Cite this