A Distinguisher-Based Attack of a Homomorphic Encryption Scheme - - PowerPoint PPT Presentation

a distinguisher based attack of a homomorphic encryption
SMART_READER_LITE
LIVE PREVIEW

A Distinguisher-Based Attack of a Homomorphic Encryption Scheme - - PowerPoint PPT Presentation

A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes erie Gauthier 1 , Ayoub Otmani 1 and Jean-Pierre Tillich 2 Val GREYC - Universit e de Caen - Ensicaen SECRET Project - INRIA Rocquencourt


slide-1
SLIDE 1

A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes

Val´ erie Gauthier1, Ayoub Otmani1 and Jean-Pierre Tillich2

GREYC - Universit´ e de Caen - Ensicaen SECRET Project - INRIA Rocquencourt

Code-based Cryptography Workshop, May 2012

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 1 / 17

slide-2
SLIDE 2

Introduction

Homomorphic encryption schemes

Proposed by Rivest, Adleman and Dertouzos in 1978.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 2 / 17

slide-3
SLIDE 3

Introduction

Homomorphic encryption schemes

Proposed by Rivest, Adleman and Dertouzos in 1978. Gentry proposed the first homomorphic scheme based in lattices in 2009.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 2 / 17

slide-4
SLIDE 4

Introduction

Homomorphic encryption schemes

Proposed by Rivest, Adleman and Dertouzos in 1978. Gentry proposed the first homomorphic scheme based in lattices in 2009. Challenge: find Homomorphic schemes based in coding therory.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 2 / 17

slide-5
SLIDE 5

Introduction

Homomorphic encryption schemes

Proposed by Rivest, Adleman and Dertouzos in 1978. Gentry proposed the first homomorphic scheme based in lattices in 2009. Challenge: find Homomorphic schemes based in coding therory. Two proposals

◮ On Constructing homomorphic Encryption Schemes from Coding

  • Theory. IMACC 2011. Armkent, Augot, Perret and Sadeghi.

◮ Homomorphic encryption from codes (Accepted to STOC 2012)

Bogdanov and Lee.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 2 / 17

slide-6
SLIDE 6

Introduction

Distingushing problem

Introduced in 2001 by Courtois, Finiasz, and Sendrier to formalize a security proof of the McEliece cryptosystem.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 3 / 17

slide-7
SLIDE 7

Introduction

Distingushing problem

Introduced in 2001 by Courtois, Finiasz, and Sendrier to formalize a security proof of the McEliece cryptosystem. A Distinguisher for High Rate McEliece Cryptosystems (ITW 2011). Faug` ere, Gauthier, Otmani, Perret and Tillich

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 3 / 17

slide-8
SLIDE 8

Introduction

Distingushing problem

Introduced in 2001 by Courtois, Finiasz, and Sendrier to formalize a security proof of the McEliece cryptosystem. A Distinguisher for High Rate McEliece Cryptosystems (ITW 2011). Faug` ere, Gauthier, Otmani, Perret and Tillich Error-correcting pairs for a public-key cryptosystem. Preprint 2012. M´ arquez-Corbella and Pellikaan.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 3 / 17

slide-9
SLIDE 9

Introduction

Distingushing problem

Introduced in 2001 by Courtois, Finiasz, and Sendrier to formalize a security proof of the McEliece cryptosystem. A Distinguisher for High Rate McEliece Cryptosystems (ITW 2011). Faug` ere, Gauthier, Otmani, Perret and Tillich Error-correcting pairs for a public-key cryptosystem. Preprint 2012. M´ arquez-Corbella and Pellikaan. Two independent attacks

◮ Cryptanalysis of the Bogdanov-Lee Cryptosystem by Gottfried Herold ◮ When Homomorphism Becomes a Liability by Zvika Brakerski.

(Cryptology ePrint Archive: Report 2012/225)

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 3 / 17

slide-10
SLIDE 10

Bogdanov-Lee Cryptosystem

Outline

1

Introduction

2

Bogdanov-Lee Cryptosystem

3

Description of the attack

4

Conclusions and futur work

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencou Attack of a Homomorphic Scheme May 2012 4 / 17

slide-11
SLIDE 11

Bogdanov-Lee Cryptosystem

Outline

1

Introduction

2

Bogdanov-Lee Cryptosystem

3

Description of the attack

4

Conclusions and futur work

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencou Attack of a Homomorphic Scheme May 2012 4 / 17

slide-12
SLIDE 12

Bogdanov-Lee Cryptosystem

Key generation

A subset L of {1, . . . , n} of cardinality 3ℓ. Generate at random n distinct xi ∈ Fq. GT

i def

=    (xi, x2

i , . . . , xℓ i , 0, . . . , 0)

if i ∈ L (xi, x2

i , . . . , xℓ i , xℓ+1 i

, . . . , xk

i )

if i / ∈ L Secret key: L, G. Public key: P def = SG where S is a random invertible over Fq.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 5 / 17

slide-13
SLIDE 13

Bogdanov-Lee Cryptosystem

Key generation - Example

A subset L of {1, . . . , n} of cardinality 3ℓ. Generate at random n distinct xi ∈ Fq.

G =           x1 . . . x3ℓ x3ℓ+1 . . . xn . . . . . . . . . xℓ

1

. . . xℓ

3ℓ

xℓ

3ℓ+1

. . . xℓ

n

. . . xℓ+1

3ℓ+1

. . . xℓ+1

n

. . . . . . . . . . . . xk

3ℓ+1

. . . xk

n

         

Secret key: L, G. Public key: P def = SG where S is a random invertible over Fq.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 5 / 17

slide-14
SLIDE 14

Bogdanov-Lee Cryptosystem

Encryption

m ∈ Fq − → c ∈ Fn

q

1 Pick z ∈ Fk

q uniformly at random.

2 Pick e ∈ Fn

q s.t. Proba

  • ei = 0 ∀i ∈ L
  • is close to one.

3 Compute

c def = zP + m1 + e where 1 ∈ Fn

q is the all-ones row vector.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencou Attack of a Homomorphic Scheme May 2012 6 / 17

slide-15
SLIDE 15

Bogdanov-Lee Cryptosystem

Decryption

1 Find y def

= (y1, . . . , yn) ∈ Fn

q that solves:

       GyT =

  • i∈L

yi = 1 yi = 0 for all i / ∈ L. (1)

2 For any solution y of (1):

m = cyT

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencou Attack of a Homomorphic Scheme May 2012 7 / 17

slide-16
SLIDE 16

Bogdanov-Lee Cryptosystem

Correctness of the Decryption

cyT = (zP + m1 + e)yT = (zP + m1)yT (since ei = 0 if i ∈ L and yi = 0 if i / ∈ L) = zSGyT + m

n

  • i=1

yi = m (since GyT = 0 and

n

  • i=1

yi = 1)

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 8 / 17

slide-17
SLIDE 17

Description of the attack

Outline

1

Introduction

2

Bogdanov-Lee Cryptosystem

3

Description of the attack

4

Conclusions and futur work

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencou Attack of a Homomorphic Scheme May 2012 9 / 17

slide-18
SLIDE 18

Description of the attack

Preliminary

Find y ∈ Fn

q s.t.

       PyT =

  • i∈L

yi = 1 yi = 0 for all i / ∈ L. (2) Remarks: PyT = 0 ⇔ SGyT = 0 then system (2) ⇔ system (1). For any y solution of (2): m = cyT. = ⇒ L is the only secret key.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 10 / 17

slide-19
SLIDE 19

Description of the attack

Definitions

Star product: a ⋆ b def = (a1b1, . . . , anbn). Star product of two codes: < A ⋆ B > is the vector space spanned by all products a ⋆ b where a ∈ A and b ∈ B. Square code: < A 2 >=< A ⋆ A > Restriction of a code A , I ⊂ {1, . . . , n} AI

def

=

  • v ∈ F|I|

q | ∃a ∈ A , v = (ai)i∈I

  • .
  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 11 / 17

slide-20
SLIDE 20

Description of the attack

Main result:

Proposition:

◮ Choose I ⊂ {1, . . . , n}. ◮ Denote J

def

= I ∩ L and C the code generated by G.

if    |J| ℓ − 1 = ⇒ dim(< C 2

I >) = 2k − 1 + |J|

|I| − |J| 2k

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 12 / 17

slide-21
SLIDE 21

Description of the attack

Recover L:

dim(< C 2

I >) = 2k − 1 + |J|

1 Recover J = L ∩ I: choose i ∈ I, consider I ′ def

= I \ {i}.

◮ If i ∈ L then dim(< C 2

I ′ >) =

  • 2k − 1 + |J|
  • − 1.

◮ If i /

∈ L then dim(< C 2

I ′ >) = 2k − 1 + |J|.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencou Attack of a Homomorphic Scheme May 2012 13 / 17

slide-22
SLIDE 22

Description of the attack

Recover L:

dim(< C 2

I >) = 2k − 1 + |J|

1 Recover J = L ∩ I: choose i ∈ I, consider I ′ def

= I \ {i}.

◮ If i ∈ L then dim(< C 2

I ′ >) =

  • 2k − 1 + |J|
  • − 1.

◮ If i /

∈ L then dim(< C 2

I ′ >) = 2k − 1 + |J|.

2 Recover L \ J: exchange i ∈ I \ J by i′ ∈ {1, . . . , n} \ I. ◮ If i′ ∈ L then dim(< C 2

I ′ >) =

  • 2k − 1 + |J|
  • + 1.

◮ If i′ /

∈ L then dim(< C 2

I ′ >) =

  • 2k − 1 + |J|
  • .
  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencou Attack of a Homomorphic Scheme May 2012 13 / 17

slide-23
SLIDE 23

Description of the attack

Explanation

Example: If L = (1, . . . , 3ℓ)

G =            x1 . . . xi1 . . . x3ℓ x3ℓ+1 . . . xi|I| . . . xn . . . . . . . . . . . . . . . . . . xℓ

1

. . . xℓ

i1

. . . xℓ

3ℓ

xℓ

3ℓ+1

. . . xℓ

i|I|

. . . xℓ

n

. . . . . . xℓ+1

3ℓ+1

. . . xℓ+1

i|I|

. . . xℓ+1

n

. . . . . . . . . . . . . . . . . . . . . . . . xk

3ℓ+1

. . . xk

i|I|

. . . xk

n

          

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-24
SLIDE 24

Description of the attack

Explanation

Example: If L = (1, . . . , 3ℓ)

G =            x1 . . . xi1 . . . x3ℓ x3ℓ+1 . . . xi|I| . . . xn . . . . . . . . . . . . . . . . . . xℓ

1

. . . xℓ

i1

. . . xℓ

3ℓ

xℓ

3ℓ+1

. . . xℓ

i|I|

. . . xℓ

n

. . . . . . xℓ+1

3ℓ+1

. . . xℓ+1

i|I|

. . . xℓ+1

n

. . . . . . . . . . . . . . . . . . . . . . . . xk

3ℓ+1

. . . xk

i|I|

. . . xk

n

          

Define:

◮ I

def

= {i1, . . . , i|I|} ⊂ {1, . . . , n}

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-25
SLIDE 25

Description of the attack

Explanation

Example: If L = (1, . . . , 3ℓ)

G =            x1 . . . xi1 . . . x3ℓ x3ℓ+1 . . . xi|I| . . . xn . . . . . . . . . . . . . . . . . . xℓ

1

. . . xℓ

i1

. . . xℓ

3ℓ

xℓ

3ℓ+1

. . . xℓ

i|I|

. . . xℓ

n

. . . . . . xℓ+1

3ℓ+1

. . . xℓ+1

i|I|

. . . xℓ+1

n

. . . . . . . . . . . . . . . . . . . . . . . . xk

3ℓ+1

. . . xk

i|I|

. . . xk

n

          

Define:

◮ I

def

= {i1, . . . , i|I|} ⊂ {1, . . . , n}

◮ J

def

= I ∩ L.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-26
SLIDE 26

Description of the attack

Explanation

|J| |I|-|J|

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-27
SLIDE 27

Description of the attack

Explanation

A

|J| |I|-|J|

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-28
SLIDE 28

Description of the attack

Explanation

A B

|J| |I|-|J|

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-29
SLIDE 29

Description of the attack

Explanation

A B C

|J| |I|-|J|

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-30
SLIDE 30

Description of the attack

Explanation

A B C

l+1

1 |J| |I|-|J|

A

B

C

l k |J| |I|-|J|

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-31
SLIDE 31

Description of the attack

Explanation

1 |J| |I|-|J|

A

B

C

l k

2 2 l l+k 2l+2 2k l+2

A A B  B B  C C  C

l+1

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-32
SLIDE 32

Description of the attack

Explanation

2 2 l l+k 2l+2 2k l+2

A A C  C

|J| |I|-|J|

l+1 l+2 2 l 2 l+1

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-33
SLIDE 33

Description of the attack

Explanation: If |J| = 0

2 2 l l+k 2l+2 2k l+2

A A C  C

|J| |I|-|J|

l+1 l+2 2 l 2 l+1

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-34
SLIDE 34

Description of the attack

Explanation: If |J| = 0 then dim(< C 2

I >) = 2k − 1

2 2 l l+k 2l+2 2k l+2

A A C  C

|J| |I|-|J|

l+1 l+2 2 l 2 l+1

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-35
SLIDE 35

Description of the attack

Fact

Consider t independent vectors: (v1,1 . . . v1,|J| v1,|J|+1 . . . v1,n) . . . . . . . . . . . . (vt,1 . . . vt,|J| vt,|J|+1 . . . vt,n)     

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-36
SLIDE 36

Description of the attack

Fact

Consider t independent vectors v1, . . . , vt: (v1,1 . . . v1,|J| v1,|J|+1 . . . v1,n) . . . . . . . . . . . . (vt,1 . . . vt,|J| vt,|J|+1 . . . vt,n) (0 . . . v1,|J|+1 . . . v1,n) . . . . . . . . . . . . (0 . . . v|J|,|J|+1 . . . v|J|,n)                    t + |J| independent vectors.

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-37
SLIDE 37

Description of the attack

Explanation: If |J| > 0 then dim(< C 2

I >) = 2k − 1 + |J|

2 2 l l+k 2l+2 2k l+2

A A C  C

|J| |I|-|J|

l+1 l+2 2 l 2 l+1 l+1+|J| l+2+|J|

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 14 / 17

slide-38
SLIDE 38

Conclusions and futur work

Outline

1

Introduction

2

Bogdanov-Lee Cryptosystem

3

Description of the attack

4

Conclusions and futur work

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencou Attack of a Homomorphic Scheme May 2012 15 / 17

slide-39
SLIDE 39

Conclusions and futur work

Conclusions and futur work

Similar attack on M. Baldi et. al. proposition

◮ Enhanced public key security for the McEliece cryptosystem.

arxiv:1108.2462v2[cs.IT]

◮ A Distinguisher-Based Attack on a Variant of McEliece’s Cryptosystem

Based on Reed-Solomon Codes. arXiv:1204.6459v1 [cs.CR]

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 16 / 17

slide-40
SLIDE 40

Conclusions and futur work

Conclusions and futur work

Similar attack on M. Baldi et. al. proposition

◮ Enhanced public key security for the McEliece cryptosystem.

arxiv:1108.2462v2[cs.IT]

◮ A Distinguisher-Based Attack on a Variant of McEliece’s Cryptosystem

Based on Reed-Solomon Codes. arXiv:1204.6459v1 [cs.CR]

Can we derive an attack for McEliece cryptosystem from a distinguisher?

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 16 / 17

slide-41
SLIDE 41

Conclusions and futur work

Conclusions and futur work

Similar attack on M. Baldi et. al. proposition

◮ Enhanced public key security for the McEliece cryptosystem.

arxiv:1108.2462v2[cs.IT]

◮ A Distinguisher-Based Attack on a Variant of McEliece’s Cryptosystem

Based on Reed-Solomon Codes. arXiv:1204.6459v1 [cs.CR]

Can we derive an attack for McEliece cryptosystem from a distinguisher? Can we build a homomorphic public key cryptosystem based in codes?

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 16 / 17

slide-42
SLIDE 42

Thank you for your attention

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 17 / 17

slide-43
SLIDE 43

Thank you for your attention

  • V. Gauthier, A. Otmani and J-P. Tillich

( GREYC - Universit´ e de Caen - Ensicaen, SECRET Project - INRIA Rocquencour Attack of a Homomorphic Scheme May 2012 17 / 17