2019
DOI: 10.1007/978-3-030-35199-1_14
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…We next show that the above method is insecure too. We use the technique from [11] to recover the difference 𝑑 π‘Ž βˆ’ 𝑑 𝑏 from 𝑧 alone with a good probability. The idea is to use the fact that every 𝑑 π‘Ž and 𝑑 𝑏 , 0 ≀ |𝑑 π‘Ž βˆ’ 𝑑 𝑏 | ≀ π‘š.…”
Section: Another Failed Attemptmentioning
confidence: 99%
“…We next show that the above method is insecure too. We use the technique from [11] to recover the difference 𝑑 π‘Ž βˆ’ 𝑑 𝑏 from 𝑧 alone with a good probability. The idea is to use the fact that every 𝑑 π‘Ž and 𝑑 𝑏 , 0 ≀ |𝑑 π‘Ž βˆ’ 𝑑 𝑏 | ≀ π‘š.…”
Section: Another Failed Attemptmentioning
confidence: 99%