Lattice Attacks and Protection of Homomorphic Encryption Algorithm in Association Rule Mining Privacy Protection Schemes

Homomorphic encryption (HE) is a kind of algorithm which provides data processing but not data access. Since it was proposed in 1978, as one of the important tools in cryptography, it is broadly used in many scenarios, like privacy protection, cloud computing, federated learning, and so on. Especial...

Full description

Saved in:
Bibliographic Details
Published inIEEE internet of things journal Vol. 12; no. 19; pp. 41024 - 41032
Main Authors Zhang, Ran, Bi, Jingguo, Li, Lixiang, Peng, Haipeng
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.10.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2327-4662
2327-4662
DOI10.1109/JIOT.2025.3591650

Cover

More Information
Summary:Homomorphic encryption (HE) is a kind of algorithm which provides data processing but not data access. Since it was proposed in 1978, as one of the important tools in cryptography, it is broadly used in many scenarios, like privacy protection, cloud computing, federated learning, and so on. Especially in the association rules mining privacy protection schemes, it is often used as a key technology to ensure data security. Recently, Li et al. and Rajasekaran et al. introduced a kind of symmetric HE algorithm in their privacy protection scheme. However, in this article, we find that this symmetric HE algorithm has the possibility to recover its secret key in practical applications. We propose two attacking algorithms based on lattice to recover its secret key <inline-formula> <tex-math notation="LaTeX">SK=(s^{d},q) </tex-math></inline-formula>. The core of our attack is to construct a lattice basis using the transformation relation between ciphertexts so that the short vector in the lattice contains the secret key SK. Then, we can use the LLL algorithm to recover the secret key. We prove the feasibility of our attacking algorithms with experiments and the experimental results suggest that all of our algorithms can recover the key within 0.1 s. Besides, we also give some improvements for this symmetric HE algorithm so that the new HE algorithm can resist our attacking algorithms.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2327-4662
2327-4662
DOI:10.1109/JIOT.2025.3591650