Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sorting

Author:

Vivek Srinivas1,Murthy Shyam1,Kumaraswamy Deepak2

Affiliation:

1. IIIT Bangalore, Electronics City, Hosur Road , Bangalore , 560100, Karnataka , India

2. Department of Computer Science and Engineering, National Institute of Technology , Surathkal , Karnataka , India

Abstract

Abstract We investigate the problem of recovering integer inputs (up to an affine scaling) when given only the integer monotonic polynomial outputs. Given n n integer outputs of a degree- d d integer monotonic polynomial whose coefficients and inputs are integers within known bounds and n d n\gg d , we give an algorithm to recover the polynomial and the integer inputs (up to an affine scaling). A heuristic expected time complexity analysis of our method shows that it is exponential in the size of the degree of the polynomial but polynomial in the size of the polynomial coefficients. We conduct experiments with real-world data as well as randomly chosen parameters and demonstrate the effectiveness of our algorithm over a wide range of parameters. Using only the polynomial evaluations at specific integer points, the apparent hardness of recovering the input data served as the basis of security of a recent protocol proposed by Kesarwani et al. for secure k k -nearest neighbor computation on encrypted data that involved secure sorting. The protocol uses the outputs of randomly chosen monotonic integer polynomial to hide its inputs except to only reveal the ordering of input data. By using our integer polynomial recovery algorithm, we show that we can recover the polynomial and the inputs within a few seconds, thereby demonstrating an attack on the protocol of Kesarwani et al.

Publisher

Walter de Gruyter GmbH

Subject

Applied Mathematics,Computational Mathematics,Computer Science Applications

Reference41 articles.

1. Guruswami V, Sudan M. Improved decoding of Reed–Solomon and algebraic-geometry codes. IEEE Trans Inform Theory. Sep. 1999;45(6):1757–67.

2. Naor M, Pinkas B. Oblivious transfer and polynomial evaluation. In: Vitter JS, Larmore LL, Leighton FT, editors. Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing. Atlanta, Georgia, USA: ACM; 1999. p. 245–54.

3. Berlekamp E. Algebraic coding theory. Vol. 8. New York: McGraw-Hill; 1968.

4. Goldreich O, Rubinfeld R, Sudan M. Learning polynomials with queries: the highly noisy case. SIAM J Discrete Math. 2000;13(4):535–70.

5. Kesarwani M, Kaul A, Naldurg P, Patranabis S, Singh G, Mehta S, et al. Efficient secure k-nearest neighbors over encrypted data. In: Proceedings of the 21th International Conference on Extending Database Technology, EDBT 2018. Vienna, Austria; March 26–29, 2018. p. 564–75.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3