48
views
0
recommends
+1 Recommend
0 collections
    8
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Bogdanov and Lee suggested a homomorphic public-key encryption scheme based on error correcting codes. The underlying public code is a modified Reed-Solomon code obtained from inserting a zero submatrix in the Vandermonde generating matrix defining it. The columns that define this submatrix are kept secret and form a set \(L\). We give here a distinguisher that detects if one or several columns belong to \(L\) or not. This distinguisher is obtained by considering the code generated by component-wise products of codewords of the public code (the so called "square code"). This operation is applied to punctured versions of this square code obtained by picking a subset \(I\) of the whole set of columns. It turns out that the dimension of the punctured square code is directly related to the cardinality of the intersection of \(I\) with \(L\). This allows an attack which recovers the full set \(L\) and which can then decrypt any ciphertext.

          Related collections

          Most cited references7

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          How to Achieve a McEliece-Based Digital Signature Scheme

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            On insecurity of cryptosystems based on generalized Reed-Solomon codes

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              On decoding by error location and dependent sets of error positions

                Bookmark

                Author and article information

                Journal
                29 March 2012
                Article
                1203.6686
                a52eae90-435d-41d9-88d2-024993f4a964

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                11 pages
                cs.CR

                Comments

                Comment on this article