Communications of the ACM
A new privacy homomorphism and applications
Information Processing Letters
Fast deterministic computation of determinants of dense matrices
ISSAC '99 Proceedings of the 1999 international symposium on Symbolic and algebraic computation
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Computing the sign or the value of the determinant of an integer matrix, a complexity survey
Journal of Computational and Applied Mathematics - Special issue: Proceedings of the international conference on linear algebra and arithmetic, Rabat, Morocco, 28-31 May 2001
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Additively homomorphic encryption with d-operand multiplications
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Hi-index | 0.89 |
We propose cryptanalysis of the First Domingo-Ferrer's algebraic privacy homomorphism E:Z"n-(Z"pxZ"q)^d where n=pq. We show that the scheme can be broken by (d+1) known plaintexts in O(d^3log^2n) time. Even when the modulus n is kept secret, it can be broken by 2(d+1) known plaintexts in O(d^4logdn+d^3log^2n+@?(m)) time with overwhelming probability.