Corpus ID: 11962791

Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping

@article{Wang2015NotesOT,
  title={Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping},
  author={Y. Wang},
  journal={IACR Cryptol. ePrint Arch.},
  year={2015},
  volume={2015},
  pages={519}
}
  • Y. Wang
  • Published 2015
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • Recently, IACR ePrint archive posted two fully homomorphic encryption schemes without bootstrapping. In this note, we show that these schemes are trivially insecure. Furthermore, we also show that the encryption schemes of Liu and Wang [6] in CCS 2012 and the encryption scheme of Liu, Bertino, and Xun [5] in ASIACCS 2014 are insecure either. 
    26 Citations

    Topics from this paper

    Fully homomorphic encryption must be fat or ugly?
    • 3
    • PDF
    Fully Homomorphic Encryption with Isotropic Elements
    • M. Yagisawa
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2016
    • 4
    • PDF
    Fully Homomorphic Encryption with Composite Number Modulus
    • M. Yagisawa
    • Mathematics, Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2015
    • 6
    • PDF
    Fully Homomorphic Encryption without bootstrapping
    • M. Yagisawa
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2015
    • 177
    • PDF
    Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings
    • J. Li, L. Wang
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2015
    • 19
    • PDF
    Fully Homomorphic Encryption on Octonion Ring
    • M. Yagisawa
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2015
    • 10
    • PDF
    A Survey on Homomorphic Encryption Schemes
    • 123
    • PDF
    Fully Homomorphic Public-Key Encryption Against Ciphertext Square Attack with Two Ciphertexts
    • PDF
    Improved fully homomorphic public-key encryption with small ciphertext size
    • M. Yagisawa
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2018
    • 1
    • PDF

    References

    SHOWING 1-9 OF 9 REFERENCES
    Practical Fully Homomorphic Encryption without Noise Reduction
    • D. Liu
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2015
    • 27
    • PDF
    Fully Homomorphic Encryption without bootstrapping
    • M. Yagisawa
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2015
    • 177
    • Highly Influential
    • PDF
    When Homomorphism Becomes a Liability
    • 23
    • PDF
    Privacy of outsourced k-means clustering
    • 60
    Query encrypted databases practically
    • 10
    • PDF
    The Octonions
    • 841
    • PDF
    On Quaternions and Octonions
    • 395
    Quaternions and Octonions
    • 44
    Fully homomorphic encryption without bootstrapping Cryptology ePrint Archive
    • Report
    • 2015