outsourced databases
Recently Published Documents


TOTAL DOCUMENTS

90
(FIVE YEARS 13)

H-INDEX

15
(FIVE YEARS 1)

Author(s):  
Yin Li ◽  
Dhrubajyoti Ghosh ◽  
Peeyush Gupta ◽  
Sharad Mehrotra ◽  
Nisha Panwar ◽  
...  
Keyword(s):  

2020 ◽  
Vol 17 (2) ◽  
pp. 222-235 ◽  
Author(s):  
Boxiang Dong ◽  
Hui Wang ◽  
Anna Monreale ◽  
Dino Pedreschi ◽  
Fosca Giannotti ◽  
...  

Author(s):  
Weipeng Lin ◽  
Ke Wang ◽  
Zhilin Zhang ◽  
Ada Wai-Chee Fu ◽  
Raymond Chi-Wing Wong ◽  
...  

2019 ◽  
Vol 488 ◽  
pp. 13-18 ◽  
Author(s):  
Xu An Wang ◽  
Jian Weng ◽  
Jianfeng Ma ◽  
Xiaoyuan Yang

2019 ◽  
Vol 2019 ◽  
pp. 1-6
Author(s):  
Quanbo Qu ◽  
Baocang Wang ◽  
Yuan Ping ◽  
Zhili Zhang

Homomorphic encryption is widely used in the scenarios of big data and cloud computing for supporting calculations on ciphertexts without leaking plaintexts. Recently, Li et al. designed a symmetric homomorphic encryption scheme for outsourced databases. Wang et al. proposed a successful key-recovery attack on the homomorphic encryption scheme but required the adversary to know some plaintext/ciphertext pairs. In this paper, we propose a new ciphertext-only attack on the symmetric fully homomorphic encryption scheme. Our attack improves the previous Wang et al.’s attack by eliminating the assumption of known plaintext/ciphertext pairs. We show that the secret key of the user can be recovered by running lattice reduction algorithms twice. Experiments show that the attack successfully and efficiently recovers the secret key of the randomly generated instances with an overwhelming probability.


Sign in / Sign up

Export Citation Format

Share Document