2018
DOI: 10.1109/tifs.2018.2790916
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(28 citation statements)
references
References 16 publications
0
27
0
1
Order By: Relevance
“…Above all, the computational complexity of our attack algorithm is ( 5 log 2 ). Obviously, it is worse than the complexity (log 4 ) of Wang et al 's attack [17]; however, our attack eliminates the assumption of known plaintext/ciphertext pairs.…”
Section: Complexity Analysismentioning
confidence: 89%
See 1 more Smart Citation
“…Above all, the computational complexity of our attack algorithm is ( 5 log 2 ). Obviously, it is worse than the complexity (log 4 ) of Wang et al 's attack [17]; however, our attack eliminates the assumption of known plaintext/ciphertext pairs.…”
Section: Complexity Analysismentioning
confidence: 89%
“…Recently, Li et al [16] designed a symmetric homomorphic encryption scheme for outsourced databases that allow multiple data owners to efficiently share their data securely without compromising the privacy of the data. However, Wang et al [17] observed that if some plaintext/ciphertext pairs were succesfully overdropped, one can efficiently recover the corresponding secret key of the scheme from the obtained plaintext/ciphertext pairs.…”
Section: Introductionmentioning
confidence: 99%
“…• Some symmetric key encryption-based schemes (e.g., [14]) can achieve low pruning time and low communication cost. However, they have a weak threat model, and therefore, they possess poor anti-attack capabilities (as analyzed in [15]). Therefore, we believe that there is a critical need to develop a secure and effective association rules mining scheme on multiowner databases with high-efficiency in a strong threat model.…”
Section: Limitation Of Prior Artmentioning
confidence: 99%
“…No adversary can deduce secret keys with only ciphertexts, thus, the schemes are tight to the only-ciphertext-attack. The scheme is proved to be insecure [15] under the known-plaintext-attack and is breached utilizing only three arbitrary pairs of plaintext/ciphertext owing to some internal logic between its parameters. Thus, the scheme cannot resist the attacks of Type-I (2)(3)(4).…”
Section: Comparison Under the Given Attacksmentioning
confidence: 99%
“…The strength of the cryptographic algorithms depended on the techniques used for managing, establishing and distributing the secret keys. Secret keys that are poorly maintained make the 2 of 21 cryptographic algorithm useless, even if the algorithm is theoretically and also, practically ideal [10,11]. Cryptographic algorithms proposed for IoT networks can be classified into the symmetric and asymmetric algorithms.…”
Section: Introductionmentioning
confidence: 99%