Paper 2022/1722

On Side-Channel and CVO Attacks against TFHE and FHEW

Michael Walter, Zama, France
Abstract

The recent work of Chaturvedi et al. (ePrint 2022/685) claims to observe leakage about secret information in a ciphertext of TFHE through a timing side-channel on the (untrusted) server. In (Chaturvedi et al., ePrint 2022/1563) this is combined with an active attack against TFHE and FHEW. The claims in (Chaturvedi et al., ePrint 2022/685) about the non-trivial leakage from a ciphertext would have far-reaching implications, since the server does not have any secret inputs. In particular, this would mean a weakening of LWE in general, since an adversary could always simulate a server on which there is side channel leakage. In this short note, we show that the claims made in the two aforementioned works with regards to the leakage through the timing side channel are false. We demonstrate that the active attack, a standard attack against IND-CPA secure LWE-based encryption, can be mounted just as efficiently without the "side channel information".

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
TFHE FHEW side-channel analysis
Contact author(s)
michael walter @ zama ai
History
2022-12-14: revised
2022-12-14: received
See all versions
Short URL
https://ia.cr/2022/1722
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1722,
      author = {Michael Walter},
      title = {On Side-Channel and CVO Attacks against TFHE and FHEW},
      howpublished = {Cryptology ePrint Archive, Paper 2022/1722},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/1722}},
      url = {https://eprint.iacr.org/2022/1722}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.