{"id":"https://openalex.org/W2782827498","doi":"https://doi.org/10.1109/tifs.2018.2790916","title":"Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme","display_name":"Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme","publication_year":2018,"publication_date":"2018-01-08","ids":{"openalex":"https://openalex.org/W2782827498","doi":"https://doi.org/10.1109/tifs.2018.2790916","mag":"2782827498"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2790916","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2790916","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053622471","display_name":"Baocang Wang","orcid":"https://orcid.org/0000-0002-2554-4464"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Baocang Wang","raw_affiliation_strings":["Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, Guilin University of Electronic Technology, Guilin, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101846152","display_name":"Yu Zhan","orcid":"https://orcid.org/0000-0002-9148-6346"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhan","raw_affiliation_strings":["Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, Guilin University of Electronic Technology, Guilin, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100622098","display_name":"Zhili Zhang","orcid":"https://orcid.org/0000-0002-6709-9506"},"institutions":[{"id":"https://openalex.org/I903994226","display_name":"Xuchang University","ror":"https://ror.org/03k174p87","country_code":"CN","type":"education","lineage":["https://openalex.org/I903994226"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhili Zhang","raw_affiliation_strings":["School of Information Engineering, Xuchang University, Xuchang, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Xuchang University, Xuchang, China","institution_ids":["https://openalex.org/I903994226"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053622471"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":5.9081,"has_fulltext":false,"cited_by_count":59,"citation_normalized_percentile":{"value":0.96839246,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"13","issue":"6","first_page":"1460","last_page":"1467"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8391008377075195},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.778045654296875},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7340928912162781},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6727786064147949},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.624518096446991},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5699947476387024},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5469021797180176},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5151194930076599},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4726860821247101},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.43310344219207764},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35259461402893066},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.33346444368362427},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31370776891708374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29841411113739014},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.19486021995544434}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8391008377075195},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.778045654296875},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7340928912162781},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6727786064147949},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.624518096446991},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5699947476387024},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5469021797180176},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5151194930076599},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4726860821247101},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.43310344219207764},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35259461402893066},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33346444368362427},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31370776891708374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29841411113739014},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.19486021995544434}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2018.2790916","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2790916","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2152359597","display_name":null,"funder_award_id":"61572390","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2958679008","display_name":null,"funder_award_id":"2017YFB0802000","funder_id":"https://openalex.org/F4320337504","funder_display_name":"Research and Development"},{"id":"https://openalex.org/G3593174882","display_name":null,"funder_award_id":"CRKL160202","funder_id":"https://openalex.org/F4320323266","funder_display_name":"Guilin University of Electronic Technology"},{"id":"https://openalex.org/G7622220324","display_name":null,"funder_award_id":"U1736111","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8545215797","display_name":null,"funder_award_id":"201601HJ-B01382","funder_id":"https://openalex.org/F4320332587","funder_display_name":"Natural Science Foundation of Ningbo"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323266","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42"},{"id":"https://openalex.org/F4320332587","display_name":"Natural Science Foundation of Ningbo","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W150223756","https://openalex.org/W153060711","https://openalex.org/W1494049356","https://openalex.org/W1557386445","https://openalex.org/W1992282993","https://openalex.org/W2031533839","https://openalex.org/W2043073371","https://openalex.org/W2071676384","https://openalex.org/W2095963390","https://openalex.org/W2116653107","https://openalex.org/W2156030242","https://openalex.org/W2164327070","https://openalex.org/W2164993238","https://openalex.org/W2166780626","https://openalex.org/W2345464210","https://openalex.org/W2402235285","https://openalex.org/W2621197184","https://openalex.org/W6606067566"],"related_works":["https://openalex.org/W3040271687","https://openalex.org/W2564633714","https://openalex.org/W3181603331","https://openalex.org/W4243621294","https://openalex.org/W2154135737","https://openalex.org/W2955176453","https://openalex.org/W203043410","https://openalex.org/W3000640539","https://openalex.org/W3118757263","https://openalex.org/W2384237980"],"abstract_inverted_index":{"Fully":[0],"homomorphic":[1,30,65,95,160,190],"encryption":[2,31,66,96,173],"supports":[3],"meaningful":[4],"computations":[5],"on":[6,148],"encrypted":[7],"data,":[8],"and":[9,17,33,180],"hence,":[10],"is":[11,97,184],"widely":[12],"used":[13],"in":[14,83,154],"cloud":[15],"computing":[16],"big":[18],"data":[19,48,59],"environments.":[20],"Recently,":[21],"Li":[22,92,170],"et":[23,93,171],"al.":[24],"constructed":[25],"an":[26],"efficient":[27],"symmetric":[28],"fully":[29],"scheme":[32,67],"utilized":[34],"it":[35],"to":[36,50],"design":[37],"a":[38],"privacy-preserving-outsourced":[39],"association":[40,54],"rule":[41],"mining":[42],"scheme.":[43],"Their":[44],"proposal":[45],"allows":[46],"multiple":[47],"owners":[49],"jointly":[51],"mine":[52],"some":[53],"rules":[55],"without":[56],"sacrificing":[57],"the":[58,64,69,76,89,106,110,119,130,134,138,142,149,163,167,181],"privacy.":[60],"The":[61],"security":[62,90],"of":[63,78,91,109,133,156,166],"against":[68],"known-plaintext":[70],"attacks":[71],"was":[72],"established":[73],"by":[74],"examining":[75],"hardness":[77],"solving":[79],"nonlinear":[80],"systems.":[81],"However,":[82],"this":[84],"paper,":[85],"we":[86,100,103,124,127],"illustrate":[87],"that":[88,102,126,153],"al.'s":[94,172],"overvalued.":[98],"First,":[99],"show":[101],"can":[104,128,175],"recover":[105],"first":[107],"part":[108,132],"secret":[111,135,164],"key":[112,136],"from":[113],"several":[114],"known":[115],"plaintext/ciphertext":[116],"pairs":[117],"with":[118],"continued":[120],"fraction":[121],"algorithm.":[122],"Second,":[123],"find":[125],"retrieve":[129],"second":[131],"through":[137],"Euclidean":[139],"algorithm":[140],"for":[141,188],"greatest":[143],"common":[144],"divisor":[145],"problem.":[146],"Experiments":[147],"suggested":[150],"parameters":[151],"demonstrate":[152],"case":[155],"more":[157],"than":[158],"two":[159],"multiplications,":[161],"all":[162],"keys":[165],"randomly":[168],"instantiated":[169],"schemes":[174],"be":[176],"very":[177],"efficiently":[178],"recovered,":[179],"success":[182],"probability":[183],"at":[185],"least":[186],"98%":[187],"one":[189],"multiplication.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":6}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
