Lattice Attacks and Protection of Homomorphic Encryption Algorithm in Association Rule Mining Privacy Protection Schemes
Homomorphic encryption (HE) is a kind of algorithm which provides data processing but not data access. Since it was proposed in 1978, as one of the important tools in cryptography, it is broadly used in many scenarios, like privacy protection, cloud computing, federated learning, and so on. Especial...
Saved in:
| Published in | IEEE internet of things journal Vol. 12; no. 19; pp. 41024 - 41032 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Piscataway
IEEE
01.10.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2327-4662 2327-4662 |
| DOI | 10.1109/JIOT.2025.3591650 |
Cover
| Summary: | Homomorphic encryption (HE) is a kind of algorithm which provides data processing but not data access. Since it was proposed in 1978, as one of the important tools in cryptography, it is broadly used in many scenarios, like privacy protection, cloud computing, federated learning, and so on. Especially in the association rules mining privacy protection schemes, it is often used as a key technology to ensure data security. Recently, Li et al. and Rajasekaran et al. introduced a kind of symmetric HE algorithm in their privacy protection scheme. However, in this article, we find that this symmetric HE algorithm has the possibility to recover its secret key in practical applications. We propose two attacking algorithms based on lattice to recover its secret key <inline-formula> <tex-math notation="LaTeX">SK=(s^{d},q) </tex-math></inline-formula>. The core of our attack is to construct a lattice basis using the transformation relation between ciphertexts so that the short vector in the lattice contains the secret key SK. Then, we can use the LLL algorithm to recover the secret key. We prove the feasibility of our attacking algorithms with experiments and the experimental results suggest that all of our algorithms can recover the key within 0.1 s. Besides, we also give some improvements for this symmetric HE algorithm so that the new HE algorithm can resist our attacking algorithms. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 2327-4662 2327-4662 |
| DOI: | 10.1109/JIOT.2025.3591650 |