Welcome to the resource topic for 2024/1858
Title:
(In)Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing
Authors: Wonhee Cho, Jiseung Kim, Changmin Lee
Abstract:Boneh et al. (CRYPTO’18) proposed two t-out-of-N threshold fully homomorphic encryption (\sf TFHE) schemes based on Shamir secret sharing scheme and \{0,1\}-linear secret sharing scheme. They demonstrated the simulation security, ensuring no information leakage during partial or final decryption. This breakthrough allows any scheme to be converted into a threshold scheme by using \sf TFHE.
We propose two polynomial time algorithms to break the simulation security of t-out-of-N \sf TFHE based on Shamir secret sharing scheme proposed by Boneh et al… First, we show that an adversary can break the simulation security by recovering the secret key under some constraints on t and N, which does not violate the conditions for security proof. Next, we introduce a straightforward fix that theoretically satisfies the simulation security. However, we argue that this modification remains insecure insecure when implemented with any state-of-the-art fully homomorphic encryption libraries in practice.
To ensure robustness against our subsequent attacks, we recommend using an error-refreshing algorithm, such as bootstrapping or modulus switching, for each addition operation.
ePrint: https://eprint.iacr.org/2024/1858
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .