• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Zengpeng, Ma Chunguang, Zhao Minghao. Leveled Fully Homomorphic Encryption Against Adaptive Key Recovery Attacks[J]. Journal of Computer Research and Development, 2019, 56(3): 496-507. DOI: 10.7544/issn1000-1239.2019.20170443
Citation: Li Zengpeng, Ma Chunguang, Zhao Minghao. Leveled Fully Homomorphic Encryption Against Adaptive Key Recovery Attacks[J]. Journal of Computer Research and Development, 2019, 56(3): 496-507. DOI: 10.7544/issn1000-1239.2019.20170443

Leveled Fully Homomorphic Encryption Against Adaptive Key Recovery Attacks

More Information
  • Published Date: February 28, 2019
  • A major open problem is to protect leveled homomorphic encryption from adaptive attacks that allow an adversary to learn the private key. In order to achieve the goal of preventing key recovery attacks on fully homomorphic encryption (FHE), Li Zengpeng et al (PROVSEC’16) proposed an multiple secret keys fully homomorphic encryption scheme under the learning with errors (LWE) assumption to prevent key recovery attacks on FHE, which did not use the notion of “valid ciphertexts” of Loftus et al (SAC’11). However, utilizing the information of noise, the attacks can still recover the information of the secret key. Li Zengpeng et al.’s scheme cannot provide an efficient method to protect the secret key. In this paper, Inspired by the work of Li Zengpeng et al (EPRINT’16), we first give a new method of key recovery attacks to Li Zengpeng et al.’s scheme; then, we propose a new FHE scheme with multiple secret keys which differs from EPRINT’16, and prove our new scheme against key recovery attacks. Our main idea is to adopt the dual version of encryption algorithm and generate a “one-time” secret key every time, so that even if an attacker can learn some bits of the one-time private key from each decryption query and cannot obtain some bits of noise, the scheme still does not allow them to compute a valid private key.
  • Related Articles

    [1]Wang Qihong, Jia Hongjie, Huang Longxia, Mao Qirong. Semantic Contrastive Clustering with Federated Data Augmentation[J]. Journal of Computer Research and Development, 2024, 61(6): 1511-1524. DOI: 10.7544/issn1000-1239.202220995
    [2]Zhou Zhiping, Zhu Shuwei, Zhang Daowen. Multiobjective Clustering Algorithm with Fuzzy Centroids for Categorical Data[J]. Journal of Computer Research and Development, 2016, 53(11): 2594-2606. DOI: 10.7544/issn1000-1239.2016.20150467
    [3]Wu Yingjie, Tang Qingming, Ni Weiwei, Sun Zhihui, Liao Shangbin. A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing[J]. Journal of Computer Research and Development, 2013, 50(3): 578-593.
    [4]Hou Wei, Dong Hongbin, Yin Guisheng. A Membership Degree Refinement-Based Evolutionary Clustering Algorithm[J]. Journal of Computer Research and Development, 2013, 50(3): 548-558.
    [5]Chong Zhihong, Ni Weiwei, Liu Tengteng, and Zhang Yong. A Privacy-Preserving Data Publishing Algorithm for Clustering Application[J]. Journal of Computer Research and Development, 2010, 47(12).
    [6]Liang Jiye, Bai Liang, Cao Fuyuan. K-Modes Clustering Algorithm Based on a New Distance Measure[J]. Journal of Computer Research and Development, 2010, 47(10): 1749-1755.
    [7]Lü Zonglei, Wang Jiandong, Li Ying, and Zai Yunfeng. An Index of Cluster Validity Based on Modal Logic[J]. Journal of Computer Research and Development, 2008, 45(9): 1477-1485.
    [8]Zhang Gang, Liu Yue, Guo Jiafeng, and Cheng Xueqi. A Hierarchical Search Result Clustering Method[J]. Journal of Computer Research and Development, 2008, 45(3): 542-547.
    [9]Jin Yifu, Zhu Qingsheng, Xing Yongkang. An Algorithm for Clustering of Outliers Based on Key Attribute Subspace[J]. Journal of Computer Research and Development, 2007, 44(4): 651-659.
    [10]Zheng Xin and Lin Xueyin. Locality Preserving Clustering for Image Database[J]. Journal of Computer Research and Development, 2006, 43(3): 463-469.

Catalog

    Article views (1181) PDF downloads (308) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return