JISE


  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16]


Journal of Information Science and Engineering, Vol. 39 No. 1, pp. 183-195


Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key


MOSTEFA KARA1, ABDELKADER LAOUID1, AHCENE BOUNCEUR2,
MOHAMMAD HAMMOUDEH3 AND MUATH ALSHAIKH4
1LIAP Laboratory, University of El Oued, Algeria
2Lab-STICC UMR CNRS, University of Western Brittany UBO, Brest
3Information and Computer Science Department
King Fahd University of Petroleum and Minerals
Dhahran, 31261 Saudi Arabia

4Computer Science Department
College of Computing and Informatics, Saudi Electronic University
11673 Riyadh, Kingdom of Saudi Arabia
E-mail: karamostefa@univ-eloued.dz; abdelkader-laouid@univ-eloued.dz;
Ahcene.Bounceur@univ-brest.fr; mohammad.hammoudeh@kfupm.edu.sa; M.ALSHAIKH@seu.edu.sa


Unconditional security means that knowledge of an encrypted text does not provide any information about the corresponding plaintext; or more, regardless of the number of ciphertexts available to an attacker, no amount of cryptanalysis can break the cipher. Until now, only the One-Time Pad (OTP) method meets this condition with well-defined assumptions. The design of a Homomorphic Encryption scheme that allows operations over the encrypted data is required in current applications to reach the highest possible level of privacy. However, existing symmetric solutions that use OTP have a key management problem; they are not linear encryption, which means that they have high computational complexity, and some of them do not meet all homomorphic properties. This article simulates the OTP taking into consideration these issues and achieving the maximum resistance to cryptanalysis, even when the attacker has great computing power. The first major advantage of the proposed OTP-based method is that it only uses a single preshared key. The key is composed of two sections, a fixed number of bits followed by random bits; the size of each section is dependent on the robustness of the system. Analysis of the proposed technique shows that it provides perfect privacy by using a different key for each message to be encrypted.


Keywords: unconditional security, perfect privacy, homomorphic encryption, OTP, confidentiality, asymmetric OTP

  Retrieve PDF document (JISE_202301_14.pdf)