A key recovery attack on Fully Homomorphic Encryption scheme

被引:0
|
作者
Guang, Yan [1 ,2 ]
Zhu, Yue-Fei [1 ]
Gu, Chun-Xiang [1 ,2 ]
Zheng, Yong-Hui [1 ,2 ]
Tang, Quan-You [1 ,2 ]
机构
[1] PLA Information Engineering University, Zhengzhou 450002, China
[2] State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China
关键词
Blending;
D O I
10.3724/SP.J.1146.2013.00300
中图分类号
学科分类号
摘要
引用
收藏
页码:2999 / 3004
相关论文
共 50 条
  • [1] Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme
    Xu, Wenju
    Zhan, Yu
    Wang, Zheng
    Wang, Baocang
    Ping, Yuan
    IEEE ACCESS, 2019, 7 : 68373 - 68379
  • [2] A Fully Homomorphic Encryption Scheme with Better Key Size
    Chen Zhigang
    Wang Jian
    Zhang ZengNian
    Song Xinxia
    CHINA COMMUNICATIONS, 2014, 11 (09) : 82 - 92
  • [3] A Fully Homomorphic Encryption Scheme With a Smaller Public Key
    Zhang, Shaomin
    Li, Kaiqiang
    Wang, Baoyi
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 762 - 767
  • [4] Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
    Tsaban, Boaz
    Lifshitz, Noam
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 75 - 78
  • [5] KEY MATRICES IN FULLY HOMOMORPHIC ENCRYPTION
    Habri, Hakim
    Chillali, Abdelhakim
    Boua, Abdelkarim
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2022, 54 : 35 - 50
  • [6] An efficient fully homomorphic encryption scheme
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Cherif
    International Journal of Network Security, 2019, 21 (01) : 91 - 99
  • [7] Leveled Fully Homomorphic Encryption Against Adaptive Key Recovery Attacks
    Li Z.
    Ma C.
    Zhao M.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (03): : 496 - 507
  • [8] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [9] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [10] Efficient multi-key fully homomorphic encryption scheme from RLWE
    Che X.
    Zhou H.
    Yang X.
    Zhou T.
    Liu L.
    Li N.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 87 - 95