Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12258/630
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBabenko, M. G.-
dc.contributor.authorБабенко, М. Г.-
dc.contributor.authorChervyakov, N. I.-
dc.contributor.authorЧервяков, Н. И.-
dc.contributor.authorKucherov, N. N.-
dc.contributor.authorКучеров, Н. Н.-
dc.contributor.authorDeryabin, M. A.-
dc.contributor.authorДерябин, М. А.-
dc.contributor.authorSvyatkin, V. E.-
dc.contributor.authorСвяткин, В. Е.-
dc.date.accessioned2018-06-18T13:44:32Z-
dc.date.available2018-06-18T13:44:32Z-
dc.date.issued2018-
dc.identifier.citationBabenko, M., Chervyakov, N., Tchernykh, A., Kucherov, N., Deryabin, M., Radchenko, G., Navaux, P.O.A., Svyatkin, V. Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack // Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018. - 2018. - Pages 270-274ru
dc.identifier.urihttps://www.scopus.com/record/display.uri?eid=2-s2.0-85048047585&origin=resultslist&sort=plf-f&src=s&nlo=1&nlr=20&nls=afprfnm-t&affilName=nort*+caucas*+fed*+univ*&sid=762e6d30544023d6a322a94577ba172b&sot=afnl&sdt=afsp&sl=53&s=%28AF-ID%28%22North+Caucasus+Federal+University%22+60070541%29%29&relpos=25&citeCnt=0&searchTerm=-
dc.identifier.urihttps://dspace.ncfu.ru:443/handle/20.500.12258/630-
dc.description.abstractWe consider cryptosystems for homomorphic encryption schemes based on the Residue Number System (RNS) and Secret Sharing Schemes. One of their disadvantages is that they are directly related to data redundancy, and hence, increasing the size of the storage. To minimize it, homophonic encryption can be combined with the arithmetic coding known as Chinese remainder theorem. We describe a new method of cryptanalysis based on a property of RNS and theory of numbers. We prove that an attacker needs only η · [log2 log2(k · pn)l arbitrary generated input files that form the 'known-plaintext', where pi is moduli RNS, to calculate the secret key required to decrypt the entire dataru
dc.language.isoenru
dc.publisherInstitute of Electrical and Electronics Engineers Inc.ru
dc.relation.ispartofseriesProceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018-
dc.subjectCloud computingru
dc.subjectHomomorphic encryptionru
dc.subjectKnown-plaintext attackru
dc.titleSecurity analysis of homomorphic encryption scheme for cloud computing: known-plaintext attackru
dc.typeСтатьяru
vkr.amountPages 270-274ru
vkr.instИнститут математики и естественных наук-
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File Description SizeFormat 
scopusresults (96).pdf
  Restricted Access
63.07 kBAdobe PDFView/Open
WoS 403 .pdf
  Restricted Access
107.7 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.