Secure Outsourcing of Hamming Distance Com-
putation. Several data are stored encrypted on an
external server (such as a cloud). The server holds
E(X) and E(Y) and can homomorphically compute
E(X ⊕ Y) then E(σ(X ⊕Y)), where σ is a randomly
chosen permutation and sends it to the client holding
the secret key. The client can then decrypt and retrieve
the Hamming distance between X and Y without the
server learning anything about the data involved
6 TOWARDS A CONCRETE
IMPLEMENTATION
We here give a proposal for concrete parameters for
our cryptosystem that would enable to achieve short-
term security, i.e. the equivalent of a 80-bit symmetric
encryption. We first recall the relations between pa-
rameters, as required by the security of proofs of Sec-
tion 4.3 and of (Applebaum et al., 2010a; Applebaum
et al., 2010b).
We assume that the privacy of the partial cryp-
tosystems (see Section 4.3) is close to 1/2. Conse-
quently, for coset coding, we require a code whose
rate is approximately h(1/4) ≈ 0.81. Since we con-
sider linear binary codes, we suggest to employ BCH
codes, but others could be used, as long as their rate
is close to h(1/4).
Finally, we would like to avoid naive attacks to
recover the keys. Since all S
j
sets are independent,
we require S
j
to be more than 80-bit sized, i.e. we
require qlog(m) > 80. Moreover we would like to
avoid a brute-force attack where the adversary picks
every (q/2)-tuple of public key rows and then looks
for q/2 other rows such that all these q rows sum up to
0. This attack requires at least (3m/n)
q/2
operations.
We consequently require (3m/n)
q/2
> 2
80
.
If we combine everything together, we suggest to
take n = 2
21
, m = 2
29
, r = 98, q = 18, l = 128, ε =
10
−6
and a linear coset coding whose underlying code
is a [128, 30,29] BCH code. This leads to a 5 GB
public key and to a 128× 540-bit private key.
We do not claim here to get a ready-to-use cryp-
tosystem. Following [3] and their will to introduce
new public-key cryptosystems relying on combinato-
rial assumptions despite the fact that they are not as
efficient today as the more classical ones. Our work
can be interpreted as a first step towards more prac-
tical implementation. Our suggestions for concrete
parameters should therefore be seen as a challenge.
We strongly support the idea of cryptanalysis of our
scheme using these parameters, or evidences that we
could reduce the parameters’ size without impact on
security.
ACKNOWLEDGEMENTS
The authors would like to thank Benny Applebaum,
Boaz Barak and Avi Wigderson for their helpful com-
ments. This work has been partially funded by the
ANR SecuLar project.
REFERENCES
Achlioptas, D. and Coja-Oghlan, A. (2008). Algorithmic
barriers from phase transitions. In FOCS, pages 793–
802.
Ajtai, M. and Dwork, C. (1997). A public-key cryptosystem
with worst-case/average-case equivalence. In STOC,
pages 284–293.
Applebaum, B., Barak, B., and Wigderson, A. (2010a).
Public-key cryptography from different assumptions.
In STOC, pages 171–180.
Applebaum, B., Barak, B., and Wigderson, A. (2010b).
Public-key cryptography from different assumptions
(extended version). http://www.cs.princeton.edu/
∼boaz/Papers/ncpkcFull2.pdf.
Blum, A., Furst, M. L., Kearns, M. J., and Lipton, R. J.
(1993). Cryptographic primitives based on hard learn-
ing problems. In CRYPTO, pages 278–291.
Bogdanov, A. and Lee, C. H. (2011). Homomorphic en-
cryption from codes. IACR Cryptology ePrint Archive,
2011:622.
Brakerski, Z. (2012). When homomorphism becomes a lia-
bility. IACR Cryptology ePrint Archive, 2012:225.
Diffie, W. and Hellman, M. E. (1976). New directions in
cryptography. IEEE Transactions on Information The-
ory, 22(6):644–654.
Feige, U., Kim, J. H., and Ofek, E. (2006). Witnesses for
non-satisfiability of dense random 3cnf formulas. In
FOCS, pages 497–508.
Gamal, T. E. (1984). A public key cryptosystem and a
signature scheme based on discrete logarithms. In
CRYPTO, pages 10–18.
Gauthier, V., Otmani, A., and Tillich, J.-P. (2012). A
distinguisher-based attack of a homomorphic encryp-
tion scheme relying on reed-solomon codes. IACR
Cryptology ePrint Archive, 2012:168.
Gentry, C. (2009). Fully homomorphic encryption using
ideal lattices. In STOC, pages 169–178.
Goldreich, O., Krawczyk, H., and Luby, M. (1988). On the
existence of pseudorandom generators. In CRYPTO,
pages 146–162.
Goldwasser, S. and Micali, S. (1982). Probabilistic encryp-
tion and how to play mental poker keeping secret all
partial information. In STOC, pages 365–377.
Juels, A. and Peinado, M. (2000). Hiding cliques for
cryptographic security. Des. Codes Cryptography,
20(3):269–280.
McEliece, R. J. (1978). A Public-Key Cryptosystem Based
On Algebraic Coding Theory. Deep Space Network
Progress Report, 44:114–116.
SECRYPT2013-InternationalConferenceonSecurityandCryptography
566