作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程

• 安全技术 • 上一篇    下一篇

针对全同态加密体制的反馈攻击

汤全有a,马传贵a,b   

  1. (信息工程大学 a. 四院;b. 数学工程与先进计算国家重点实验室,郑州 450002)
  • 收稿日期:2013-01-21 出版日期:2014-06-15 发布日期:2014-06-13
  • 作者简介:汤全有(1986-),男,硕士研究生,主研方向:信息安全,全同态加密;马传贵,教授、博士

Feedback Attack Against Fully Homomorphic Encryption System

TANG Quan-you  a, MA Chuan-gui  a,b   

  1. (a. 4th Institute; b. State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450002, China)
  • Received:2013-01-21 Online:2014-06-15 Published:2014-06-13

摘要: 全同态加密体制能够在不解密的条件下对密文进行任意的函数运算,是解决云计算中数据隐私保护难题的关键技术。构造全同态加密方案的核心是有效控制密文同态运算中的噪声增长,稀疏子集和问题是实现该目标所需的基本困难性问题。针对基于该问题困难性的全同态加密方案,提出一种改进的反馈攻击方法,使攻击者可以对公钥中的部分数据进行特定计算,通过访问解密谕示得到完整的私钥。分析结果表明,该方法能够充分利用预计算提高攻击效率,对基于稀疏子集和问题的全同态加密方案具有良好的适用性。

关键词: 全同态加密, 云计算, 稀疏子集和问题, 解密谕示, 反馈攻击, 预计算

Abstract: Fully Homomorphic Encryption(FHE) allows one to compute arbitrary functions over encrypted data without the decryption key. It is an important technology for private data protection in cloud computing. The highlight of constructing a FHE scheme is to successfully control the noise produced during the homomorphic operations of ciphertexts. The Sparse Subset Sum Problem(SSSP) is one of the basic hard problems used for the noise control. An improved reaction attack against FHE schemes based on the hardness of SSSP is proposed. The adversary can take special computation for the public key, and get the whole decryption key through access to the decryption oracle. Analysis result shows that compared with the known similar attacks, the advantage of the attack is the full use of pre-computing, which improves the efficiency and gains better applicability.

Key words: Fully Homomorphic Encryption(FHE), cloud computing, Sparse Subset Sum Problem(SSSP), decryption oracle, feedback attack, pre-computing

中图分类号: