Journal of Cryptologic Research

 Citation Search Quick Search DOI Advanced
» Submission Online
» Instruction for Authors
» Template
 » Peer Review    » Peer Review Policy
 Journal Online » Accepted    » In Press    » Current Issue    » Earlier Issues    » View by Fields    » Top Downloaded    » RSS

 2017, 4(6)
 HighLights More»
 · Biclique Cryptanalysis of Lightweight Block Cipher PRINCE——YUAN Z, PENG Z
 · Cube Attack on Round-reduced Fruit——SUN Y S
 · Fair Secret Sharing Scheme with Unconditional Security—— ZHANG B H, XIE X J, TANG Y S
 · Distinguish Attack on Round-reduced SHA3-512 Based on Impossible Differential——DING Y L, LI L, JIA K T
 · Preface on Homomorphic Encrpytion——CHEN K F, JIANG L Z
 Journal of Cryptologic Research--2017, 4 (6)   Published: 28 December 2017
Biclique Cryptanalysis of Lightweight Block Cipher PRINCE Hot!
YUAN Z, PENG Z
Journal of Cryptologic Research. 2017, 4 (6): 517-527.
Full Text: HTML (1 KB)  PDF (3937 KB)  ( 138 )
Show Abstract ( 122 )

PRINCE is an involutive lightweight block cipher proposed by Rechberger et al. at ASIACRYPT 2012 and is widely used in many resource constrained devices. The block length of PRINCE is 64 bits and key length is 128 bits. PRINCE is based on the so-called FX construction, where one part of the key is used for the core cipher PRINCEcore, and the remaining part of the key is used for whitenings before and after the core. PRINCEcore is also a block cipher which contains the major encryption process. Biclique cryptanalysis is a new cryptanalysis of block ciphers, which caused wide attention by cryptanalysts. Abed et al. gave the security evaluations of PRINCEcore against Biclique attack with computational complexity of 262.72 encryptions and data complexity of 240 chosen ciphertexts. Inspired from their work, this paper gives two kinds of Biclique attacks on PRINCEcore. After the introduction of balanced Biclique construction and star-based Biclique construction, a general flow of Biclique attack is given, and the construction of PRINCE is introduced. Then, Abed's method is improved and a balanced Biclique on the initial round of PRINCEcore is constructed with computation complexity of 262.69 encryptions and data complexity of 232 chosen plaintexts, which are better than the previous results. Finally, a star-based Biclique on PRINCEcore is constructed. The computational complexity of the star-based Biclique attack against PRINCEcore is 263 encryptions and a single plaintext-ciphertext pair. This is the optimal data complexity among the existing results of full round attack on PRINCEcore.

Cube Attack on Round-reduced Fruit Hot!
SUN Y S
Journal of Cryptologic Research. 2017, 4 (6): 528-536. ;  doi: 10.13868/j.cnki.jcr.000204
Full Text: HTML (1 KB)  PDF (485 KB)  ( 97 )
Show Abstract ( 77 )

The cube attack is an algebraic cryptanalysis method introduced by Dinur and Shamir at EUROCRYPT 2009, it aims to extract linear relations about secret variables from the targeted primitives, and the difficulty is to find a good cube. Ultra-lightweight stream ciphers have the advantages of high speed, low power consumption, easy to implement and so on. The market demand for ultra-lightweight stream ciphers is very large, which makes the ultra-lightweight stream ciphers to be more attractive. In 2015, Armknetcht et al. proposed a new design direction for lightweight stream ciphers, with repeated use of initial key bits in each round of key stream bit generation. Based on this idea, they proposed a new ultra-lightweight stream cipher named Sprout, with the internal state size and the key size are both 80 bits. An ultra-lightweight stream cipher Fruit was designed by  Ghafari et al. in 2016 to reduce the internal state without harming its security against time-memory-data tradeoff attack. This work applies the cube attack to round-reduced Fruit. We consider a few new ideas for obtaining good cubes. The cube attack on round-reduced Fruit (83 rounds, up to 86 rounds) can recover 17 bits of keys out of the 80-bit key, which is 217 times faster than exhaustive key search. The linear polynomial is found to be only related to the last 17 bits of the key, no linear representation is found in the first 63 bits of the key. This result is due to the round key function of the Fruit algorithm, it is a good reference for the analysis of the round key function.

Fair Secret Sharing Scheme with Unconditional Security Hot!
ZHANG B H, XIE X J, TANG Y S
Journal of Cryptologic Research. 2017, 4 (6): 537-544. ;  doi: 10.13868/j.cnki.jcr.000205
Full Text: HTML (1 KB)  PDF (766 KB)  ( 115 )
Show Abstract ( 100 )

Secret sharing scheme is an important branch of modern cryptography. It is also an important tool for information security and data privacy, and has been widely used in digital signature, secure multiparty computation, error-correcting codes,  politics, economy, military and diplomacy. In many existing secret sharing schemes, the construction is based on Shamir's method. In Shamir's (t,n) threshold scheme, the secret is shared among n participants, such that t or more participants can cooperate to recover the secret, and t-1 or fewer participants cannot. However, in the secret recovery phase of Shamir's scheme, if a dishonest participant presents a fake share and other participants provide the true shares, although verification algorithm can be used to check the validity of shares, it cannot prevent the adversary from obtaining the true secret while the honest participants recover a false secret, so it is not fair for the honest participants. This paper proposes a fair threshold secret sharing scheme and shows its fairness and security against non-cooperative attack with synchronization, non-cooperative attack with asynchronization, cooperative attack with synchronization and cooperative attack with asynchronization. There is no cryptographic assumption, so it is unconditionally secure, which makes this scheme more efficient and useful in practical applications.

Distinguish Attack on Round-reduced SHA3-512 Based on Impossible Differential Hot!
DING Y L, LI L, JIA K T
Journal of Cryptologic Research. 2017, 4 (6): 545-557. ;  doi: 10.13868/j.cnki.jcr.000206
Full Text: HTML (1 KB)  PDF (4243 KB)  ( 53 )
Show Abstract ( 45 )

Keccak is a family of Hash functions with sponge construction, which was designed by Bertoni et al., and selected as the winner of the SHA3 competition. The security analysis of Keccak can be divided into three parts, which are the analyses of Keccak in the context of hashing, the analyses on Keccak-MAC and authenticated encryption schemes, and the distinguish attacks on Keccak-f permutations. This paper studies the impossible differential property of Keccak, and presents a distinguish attack based on it. It is found that the XOR of two bits in a column remains unchanged after the linear operation $\fn_jvn \100dpi \inline \theta$ in the round function. Based on this property, a 4-round impossible differential characteristic of Keccak function can be constructed. Considering that the sizes of the message and the digest are different in each version and will affect the choice of the input and output differentials, an impossible differential characteristic is selected that conforms to SHA3-512. Then we develop a property of the non-linear operation $\fn_jvn \100dpi \inline \chi^{-1}$, which shows that when the input pairs satisfy some constraints, the output difference and the input difference should be equal. Finally, Based on the characteristic and the property, an impossible differential distinguish attack on 4-round SHA3-512 is performed. The success rate of this attack is 99%, where the data complexity is 28.21 messages and the corresponding time complexity is 28.21. We did some experiments to verify the above theoretical results by taking SHA-512 as the random function, and it shows that the complexity of our attack is better than other methods in the same number of rounds.

Preface on Homomorphic Encrpytion Hot!
CHEN K F, JIANG L Z
Journal of Cryptologic Research. 2017, 4 (6): 558-560. ;  doi: 10.13868/j.cnki.jcr.000207
Full Text: HTML (1 KB)  PDF (351 KB)  ( 840 )
Show Abstract ( 364 )
Overview on Fully Homomorphic Encryption Hot!
LI Z P, MA C G, ZHOU H S
Journal of Cryptologic Research. 2017, 4 (6): 561-578. ;  doi: 10.13868/j.cnki.jcr.000208
Full Text: HTML (1 KB)  PDF (746 KB)  ( 200 )
Show Abstract ( 95 )

With the popularization of cloud computing model, the outsourcing of data storage and computing services has become an inevitable trend, and the issues of data security and privacy protection have attracted more and more attention from the industry and academia. Fully homomorphic encryption (FHE) cryptosystems, which can complete the processing tasks on ciphertexts without leakage of sensitive information, have the inherent characteristics of protecting users' data security and privacy. Moreover, since the lattice cipher has the property of resisting quantum attack and homomorphism operation, it makes the study of lattice-based FHE under the spotlight. Currently, the research of fully homomorphic encryption mainly focuses on two aspects: improving the design and performance of the schemes, and exploring the potential applications. This paper overviews the following: the three phases of fully homomorphic encryptions, lattice-based design of homomorphic encryption systems, and the problems which the fully homomorphic encryptions are facing with. This paper presents a comprehensive review on the important research results in this field since the first fully homomorphic encryption scheme proposed by Gentry (at STOC 2009).

Simple Analysis on Noiseless Fully Homomorphic Encryptions Hot!
WANG L C,LI J
Journal of Cryptologic Research. 2017, 4 (6): 579-595. ;  doi: 10.13868/j.cnki.jcr.000209
Full Text: HTML (1 KB)  PDF (596 KB)  ( 124 )
Show Abstract ( 53 )
Fully homomorphic encryption is undoubtedly one of the forefront of the hot topics in the current international cryptographic community. Since Gentry published the first FHE scheme, many other FHE schemes have been proposed. Some are new implementations based on different platforms, and some are focused on efficiency improvements. Throughout those FHE schemes, it is not difficult to find that most are based on the noise'' technology. On one hand, noise plays a very important role in ensuring the hardness of the underlying intractability assumptions of the corresponding schemes. On the other hand, the suppression of the noise accumulation is often one of the core technics of the related constructions. Noise seems to be a double-edge and inevitable sword in building FHEs: the introduction of noise and the suppression of noise accumulation are also inherent barriers to the improvement of the performance. One important problem is the existence and construction of noiseless FHE schemes. Although many people think that noiseless FHEs are insecure, the exploration of the noiseless FHEs is always a significant topic before the negative conclusions of such proofs are strictly demonstrated. In fact, several noiseless FHEs have already been proposed, but none can be proved strictly secure and feasible in the framework of provable security. This survey mainly discusses the design idea and the security of known noiseless FHEs.
Application of (Fully) Homomorphic Encryption for Encrypted Computing Models Hot!
JIANG L Z, XU C X, WANG X F, CHEN K F, WANG B C.
Journal of Cryptologic Research. 2017, 4 (6): 596-610. ;  doi: 10.13868/j.cnki.jcr.000210
Full Text: HTML (1 KB)  PDF (5733 KB)  ( 843 )
Show Abstract ( 367 )

With the rapid development of cloud computing and big data, data security, user privacy protection and commercial use of data in the cloud are challenging problems for academia and industry. How to ensure the effective use of data on the basis of ensuring data confidentiality and user privacy is an important problem. (Fully) homomorphic encryption provides one of the effective solutions to this problem. First of all, this paper introduces the relationship and balance among the data storage security, user privacy protection and business utilization of data in the cloud. Then, this paper presents efficiency comparison and analysis of the Gentry primitive scheme based on ideal lattice, BGV scheme and FV scheme from RLWE. Based on the comparison and analysis, this paper gives a specific parameter setting, a detailed analysis of the key generation time, decryption time and homomorphic evaluation time on encrypted data. It is found that the somewhat homomorphic encryption scheme based on RLWE provides a more efficient solution for many computational models and algorithms concerning practical problems. Finally, two cases based on BGV scheme and efficiency analysis are given. Efficiency analysis and experimental results show that the somewhat homomorphic encryption scheme from RLWE is the most effective solution for data privacy, user privacy protection and commercial utilization of data.

Efficient Homomorphic Encryption and Its Application Hot!
YANG H M, JIN B L, CHEN C, WU X Y
Journal of Cryptologic Research. 2017, 4 (6): 611-619. ;  doi: 10.13868/j.cnki.jcr.000211
Full Text: HTML (1 KB)  PDF (1074 KB)  ( 134 )
Show Abstract ( 89 )

With the development of cloud computing and data mining, user's data privacy becomes more and more valuable. Privacy preserved computation turns out to be a good subject. Homomorphic encryption schemes allow the calculation of ciphertext without secret key. The calculations can be completed without any privacy leaking in theory. Many homomorphic encryption schemes have been proposed based on Gentry's work, and most of them cannot be used practically because of their low performance. Zhou proposed a somewhat homomorphic encryption scheme named VHE, which was an integral extension of PVW proposed by Brakerski. As a result, VHE has higher ability than PVW. However its applications are limited because there are some security problems with VHE. This paper introduces an enhanced version of VHE, which possesses a higher performance and better security. Some security analysis on it is given trying to clarify its security limits. A simple demo is also given to test its performance in homomorphic calculation. It shows to have a much higher performance than the original VHE scheme, and require much less memory when perform encryptions. This makes it possible to build applications based on VHE for low performance machines.

Parallel FHEW Based on Multi-core CPU Hot!
YANG X Y, DING Y T, ZHOU T P
Journal of Cryptologic Research. 2017, 4 (6): 620-626. ;  doi: 10.13868/j.cnki.jcr.000212
Full Text: HTML (1 KB)  PDF (481 KB)  ( 75 )
Show Abstract ( 74 )

Fully homomorphic encryption algorithm is developing rapidly, but it still can not be applied because of its inefficiency. In order to speed up the operation speed of the full homomorphic encryption algorithm FHEW, the parallel algorithm of FHEW scheme is proposed to accelerate the speed of fully homomorphic encryption. This study finds the characteristics that FHEW involves a large number of independent matrix and vector operations, and multi-core CPU fits for the calculation of mass of independent date. First of all, by analyzing and comparing the characteristics and running time of the four main processes of FHEW algorithm, we find that most time-consuming processes in the algorithm are the key generation process and the homomorphism NAND gate (including the bootstrap process), and the two processes involve a large number of independent matrix and vector operations. Secondly, considering that there are a large number of discrete Fourier transform and inverse transform in the algorithm, these transform and inverse transform consume a large amount of time and memory resources. In this study, most of the discrete Fourier transform and inverse transform function are calculated in parallel, which improves discrete Fourier transform function speed, to further improve the program efficiency. Finally, the original algorithm and parallel algorithm are run 18 times respectively to get the average running time. Experimental results show that, the running time of the key generation algorithm is reduced from 13,029 ms to 2434 ms and the efficiency is improved by 4.35 times. The running time of a homomorphism and NAND gate operation is reduced from 298.5 ms to 81 ms, which improves the efficiency 2.68 times.

Journal of Cryptologic Research
 Accepts Note: The papers published below will continue to be available from this page until they are assigned to an issue. To see an article, click its [PDF] link. To review many abstracts, check the boxes to the left of the titles you want, and click the 'Selected articles' button. To see one abstract at a time, click its [Abstract] link.
Journal of Cryptologic Research
 2017 Vol.4 No.1 No.2 No.3 No.4 No.5 2016 Vol.3 No.1 No.2 No.3 No.4 No.5 No.6 2015 Vol.2 No.1 No.2 No.3 No.4 No.5 No.6 2014 Vol.1 No.1 No.2 No.3 No.4 No.5 No.6

»

Bitcoin and Digital Fiat Currency

QIN B, CHEN L C H, WU Q H, ZHANG Y F, ZHONG L, ZHENG H B
2017, 4(2): 186-186. Full Text: PDF (1282KB) (2058)
»

The Design of an Anti-Counterfeiting System Based on Blockchain

AN R, HE D B, ZHANG Y R, LI L
2017, 4(2): 208-208. Full Text: PDF (2475KB) (1893)
»

Preface on Cryptocurrency

ZHANG F G
2017, 4(2): 0-0. Full Text: PDF (186KB) (682)
»

A Privacy Preserving Fair Contract Signing Protocol based on Block Chains

TIAN H B, HE J J, FU L Q
2017, 4(2): 198-198. Full Text: PDF (883KB) (1439)
»

Analysis of a New CCA-secure Public-key Cryptosystem

WANG X, XUE R
2017, 4(2): 113-113. Full Text: PDF (728KB) (717)
»

Application of (Fully) Homomorphic Encryption for Encrypted Computing Models

JIANG L Z, XU C X, WANG X F, CHEN K F, WANG B C.
2017, 4(6): 610-610. Full Text: PDF (5733KB) (843)
»

Preface on Homomorphic Encrpytion

CHEN K F, JIANG L Z
2017, 4(6): 560-560. Full Text: PDF (351KB) (840)
»

Related-key Differential Attack on Lightweight Block Cipher ESF

YIN Jun, SONG Jian, ZENG Guang, MA Chuan-Gui
2017, 4(4): 344-344. Full Text: PDF (2109KB) (623)
»

Multi-identity-based Fully Homomorphic Encryption from Obfuscation

WANG W L, HU B
2017, 4(2): 175-175. Full Text: PDF (760KB) (624)
»

A Multidimensional Data Aggregation Scheme in Multilevel Network in Smart Grid

ZHOU H, CHEN J, ZHANG Y Y, DANG L J
2017, 4(2): 132-132. Full Text: PDF (2728KB) (471)
»

A Note on Vectorial Bent Functions in Binomial Forms

HUANG D M, TANG C M.
2017, 4(2): 105-105. Full Text: PDF (649KB) (436)
»

Preface on Cryptographic Functions

ZHANG W G
2017, 4(3): 0-0. Full Text: PDF (108KB) (386)
»

Rational Secret Sharing Scheme Based on Group

LI M H, TIAN Y L
2017, 4(3): 217-217. Full Text: PDF (420KB) (400)
»

Reconstructing Truncated Sequences Derived from Primitive Sequences over Integer Residue Rings

YANG J B, ZHU X Y
2017, 4(2): 150-150. Full Text: PDF (510KB) (405)
»

A Boolean Circuit Homomorphic Encryption Scheme Based on LWE Problem

JI C, CAI B, XIANG H, DING J T,SANG J
2017, 4(3): 240-240. Full Text: PDF (824KB) (363)
»

Power Analysis and Protection on BBC encoding LBlock Decryption Algorithm

GUAN M Y, YU G R, XIANG Y X, TAN Z N, ZHANG G S, WANG A
2017, 4(3): 228-228. Full Text: PDF (3499KB) (249)
»

Preface on Post-quantum Cryptography

YU Y
2017, 4(5): 473-473. Full Text: PDF (140KB) (379)
»

Verifiable Outsourcing Attribute-based Signature Scheme

HAN Y L, CHEN F, CHEN X Y
2017, 4(2): 164-164. Full Text: PDF (1224KB) (446)
»

Secure Multiparty String Matching Computation

KANG J, LI S D, YANG X Y
2017, 4(3): 252-252. Full Text: PDF (1018KB) (313)
»

Recent Progress in (Fast) Algebraic Immunity of Boolean Functions

TANG D
2017, 4(3): 272-272. Full Text: PDF (371KB) (325)
»

An Efficient Identity-based Ring Signature Scheme over a Lattice

JIA X Y, HE D B, XU Z Y, LIU Q
2017, 4(4): 404-404. Full Text: PDF (1576KB) (397)
»

Several Constructions of Permutation Polynomials over Finite Fields

ZHA Z B, HU L
2017, 4(3): 298-298. Full Text: PDF (369KB) (359)
»

Efficient,Verifiable and Secure Outsourcing of Matrix Multiplication

WU D D, LAI Q Q,YANG B
2017, 4(4): 332-332. Full Text: PDF (1314KB) (334)
»

A Secure Mutual Authentication Protocol Based on SRAM PUF

LIU D, GUO L M, YU J, WANG L H, SHAN W J
2017, 4(4): 371-371. Full Text: PDF (11607KB) (328)
»

A Survey on the Construction of Hash Proof Systems based on Lattices

LAI Q Q, YANG B, YU Y, CHEN Y, GU X Y
2017, 4(5): 484-484. Full Text: PDF (1015KB) (283)
»

Online/Offline Signature Scheme Based on Ideal Lattices

XIANG X Y
2017, 4(3): 261-261. Full Text: PDF (365KB) (308)
»

Post-quantum Key Exchange from Lattice

LIU Y M, LI X X, LIU H L
2017, 4(5): 497-497. Full Text: PDF (548KB) (357)
»

Analysis of Lightweight 4*4 MDS Matrices over GL(4, F2)

CAI C L, TANG C M, YU Y Y, GAO L, LAI Y
2017, 4(4): 383-383. Full Text: PDF (1362KB) (255)
»

A Survey on Results of Rotation Symmetric Boolean Functions

GAO G P
2017, 4(3): 290-290. Full Text: PDF (375KB) (268)
»

The Universally Composable Framework of Cryptographic Service APIs

XU K Y, YUAN Q J, TAN L, LU S Q
2017, 4(4): 412-412. Full Text: PDF (2138KB) (300)
Journal of Cryptologic Research
»

Research on Attribute-based Cryptography

Feng D G, Chen C
2014, 1(1): 12-12. Full Text: PDF (769KB) (6028)
»

Survey of Lattice-based Cryptography

Wang X Y, Liu M J
2014, 1(1): 27-27. Full Text: PDF (678KB) (5721)
»

An Overview on the Security Techniques and Challenges of the Internet of Things

Wu C K
2015, 2(1): 53-53. Full Text: PDF (401KB) (4446)
»

Research on White-box Cryptography

Lin T T, Lai X J
2015, 2(3): 267-267. Full Text: PDF (333KB) (3925)
»

Secret Key Extraction in Wireless Channel

Li G Y, Hu A Q, Shi L
2014, 1(3): 224-224. Full Text: PDF (1519KB) (3377)
»

Provable Security for Public Key Encryption——Challenges and Approaches

Liu S L
2014, 1(6): 550-550. Full Text: PDF (447KB) (3060)
»

Cryptanalysis of Quantum Cryptographic Protocols

Wen Q Y, Qin S J, Gao F
2014, 1(2): 210-210. Full Text: PDF (866KB) (2956)
»

A Threshold Scheme for SM2 Elliptic Curve Cryptographic Algorithm

Shang M, Ma Y, Lin J Q, Jing J W
2014, 1(2): 166-166. Full Text: PDF (1051KB) (2832)
»

Faster Cryptanalytic Time-memory Trade-off Using Rainbow Table

Zheng Z X, Ji Q B, Yu H B
2014, 1(1): 110-110. Full Text: PDF (778KB) (2594)
»

Power Analysis on Lightweight Mask Scheme

Tang M, Wang X, Li Y B, Xiang X, Qiu Z L, Zhang H G
2014, 1(1): 63-63. Full Text: PDF (1621KB) (2576)
 Top Cited Top CitedTop CitedTop CitedTop CitedTop Cited
 Supervised by China Association for Science and Technology(CAST) Sponsored by Chinese Association for Cryptologic Research(CACR),Beijing Academy of Information Science & Technology(BAIST) and China Science and Technology Press
Announcement
 · Call for Papers for Special Column “Secure Multi-party Computation”
 · Call for Papers of 2018 CACR Conference on Cryptology Algorithm
 · Call for Papers of 2018 CACR Conference on Cryptology Evaluation
 · Subscription Notification of Journal of Cryptologic Research
 · Good News: Journal of Cryptologic Research Successfully Indexed by CSTPCD
 · Second Notice on the 2017 Annual Conference of Chinese Association for Cryptologic Research
 · Editor-in-Chief (Expanded) Meeting Held
 · Call for Papers for the 2017 Annual Conference of Chinese Association for Cryptologic Research
 · Recommended Academic Periodicals and International Conferences List by Chinese Association for Crypt
 · Chinese Association for Cryptologic Research and Editorial Department of Journal of Cryptologic Rese
more>>
 Links » CACR    » MathMagic    » Journal of Software