Etd

Popping Bubbles: Cryptanalysis of Homomorphic Encryption

Public

Downloadable Content

open in viewer

Imagine an encryption scheme where it is possible to add and multiply numbers without any knowledge of the numbers. Instead one could manipulate encryptions of the numbers and then the decryption of the result would give the result of the arithmetic on the original numbers. Encryption algorithms with this property are called homomorphic and have various applications in cloud computing. Homomorphic encryption schemes exist but are generally so inefficient that they are not practical. This report introduces a toy cryptosystem called Bubbles: a somewhat homomorphic encryption scheme created by Professor Martin and Professor Sunar at Worcester Polytechnic Institute. We will show that the original scheme is insecure and may be efficiently ""popped"". We will then examine two variations of the scheme that introduce noise to increase security and show that Bubbles is still vulnerable except when parameters are carefully chosen. However these safe parameter choices make Bubbles more inefficient than other recent homomorphic schemes.

Creator
Contributors
Degree
Unit
Publisher
Language
  • English
Identifier
  • etd-042816-121941
Keyword
Advisor
Defense date
Year
  • 2016
Date created
  • 2016-04-28
Resource type
Rights statement
Last modified
  • 2023-10-06

Relations

In Collection:

Items

Items

Permanent link to this page: https://digital.wpi.edu/show/t148fh25m