Research Article

Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme

Algorithm 1

The Attack Algorithm.

Input:   ciphertexts
Output:  private key
for    to    do
  
end for
 Set with ’s
for    to    do
  
end for
 Set with ’s
for    to    do
  
end for
 Compute
 Compute
return