Cryptanalysis of tran-pang-deng verifiable homomorphic encryption

0Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Tran, Pang and Deng (AsiaCCS’16) proposed two verifiable computation schemes on outsourced encrypted data in the cloud computing scenario. One of them enables the delegation of linear functions and the other is constructed for multivariate quadratic polynomials. In the quadratic function case, it was claimed that their scheme is the first to guarantee both confidentiality of input data and authenticity of computations without using fully homomorphic encryption (FHE). In this paper we present a cryptanalysis which shows that their scheme cannot guarantee confidentiality of input data. We start with a technical lemma on pseudorandom functions that have a range of Abelian group and then provides a simple attack which allows the adversary to successfully break the scheme with probability close to 1.

Cite

CITATION STYLE

APA

Xu, S., He, Y., & Zhang, L. F. (2018). Cryptanalysis of tran-pang-deng verifiable homomorphic encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10779 LNCS, pp. 59–70). Springer Verlag. https://doi.org/10.1007/978-3-319-78556-1_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free