期刊文献+

Cycling Attacks against Homomorphic Cryptosystems

Cycling Attacks against Homomorphic Cryptosystems
原文传递
导出
摘要 We study security of some homomorphic cryptosysterns with similar algebraic structure. It is found out that those cryptosystems have special common properties. Based on these properties, we pose two cycling attacks and point out some parameters under which the attacks are efficient. It is verified that randomly selected parameters almost impossibly submit to such attacks. Anyhow, two effective methods are given to construct weak parameters for certain homomorphic cryptosystems, and two moduli over 1 024 bits computed by them are shown to be vulnerable to our cycling attacks. It is concluded that strong primes should be used to avert weak parameters. We study security of some homomorphic cryptosysterns with similar algebraic structure. It is found out that those cryptosystems have special common properties. Based on these properties, we pose two cycling attacks and point out some parameters under which the attacks are efficient. It is verified that randomly selected parameters almost impossibly submit to such attacks. Anyhow, two effective methods are given to construct weak parameters for certain homomorphic cryptosystems, and two moduli over 1 024 bits computed by them are shown to be vulnerable to our cycling attacks. It is concluded that strong primes should be used to avert weak parameters.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期727-732,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the High-Technology Research and Development Progrom of China (863 Program) (2007AA701315) the National Natural Science Foundation of China (60763009)
关键词 homomorphic cryptosystem projection problem cycling attack weak parameter homomorphic cryptosystem projection problem cycling attack weak parameter
  • 相关文献

参考文献10

  • 1Damgard I,Jurik M.A Generalisation, A Simplification and Some Applications of Paillier’s Probabilistic Public-Key Sys- tem[].Public Key Cryptography.2001
  • 2Galbraith S D.Elliptic Curve Paillier Schemes[].Cryptog- raphy.2002
  • 3Rivest R L,Silverman R D.Are ‘Strong’ Primes Needed for RSA. http://eprint.iacr.org/2001/007 . 2008
  • 4Joye M,Quisquater J,Tagaki T.How to Choose Secret Pa- rameters for RSA-Type Cryptosystems over Elliptic Curves[].Designs Codes and Cryptography.2001
  • 5Gjφsteen K.Homomorphic Cryptosystems Based on Sub- group Membership Problems[].Progress in Cryptology- MYCRYPT.2005
  • 6Choi D H,Choi S,Won D.Improvement of Probabilistic Public Key Cryptosystem Using Discrete Logarithm[].The th International Conference on Information Security and Cryptology.2002
  • 7Sakurai K,Takagi T.On the Security of A Modified Paillier Public-key Primitive[].Proceedings of the th Australian Conference on Information Security and Privacy.2002
  • 8Ribenboim P.The Book of Prime Number Records[]..1988
  • 9Isobe S,Kumagai W,Mambo M, et al.Toward Separating Integer Factoring from Discrete Logarithm Mod p[].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.2007
  • 10Aoki K,Franke J,Kleinjung T, et al.A Kilobit Special Num- ber Field Sieve Factorization. http:// eprint. iacr.org /2007 /205.pdf . 2008

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部