Achievable CCA2 Relaxation for Homomorphic Encryption

被引:0
|
作者
Akavia, Adi [1 ]
Gentry, Craig [2 ]
Halevi, Shai [3 ]
Vald, Margarita [4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Cornami, New York, NY USA
[3] AWS, New York, NY USA
[4] Intuit Inc, Petah Tiqwa, Israel
关键词
Chosen plaintext attack; Chosen ciphertext attack; Homomorphic encryption; Cryptographic protocols; Client aided protocols; Functional bootstrapping oracle;
D O I
10.1007/s00145-024-09526-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Homomorphic encryption (HE) protects data in-use, but can be computationally expensive. To avoid the costly bootstrapping procedure that refreshes ciphertexts, some works have explored client-aided outsourcing protocols, where the client intermittently refreshes ciphertexts for a server that is performing homomorphic computations. But is this approach secure against malicious servers? We present a CPA-secure encryption scheme that is completely insecure in this setting. We define a new notion of security, called funcCPA , that we prove is sufficient. Additionally, we show:Homomorphic encryption schemes that have a certain type of circuit privacy-for example, schemes in which ciphertexts can be "sanitized"-are funcCPA-secure.In particular, assuming certain existing HE schemes are CPA-secure, they are also funcCPA-secure.For certain encryption schemes, like Brakerski-Vaikuntanathan, that have a property that we call oblivious secret key extraction, funcCPA-security implies circular security-i.e., that it is secure to provide an encryption of the secret key in a form usable for bootstrapping (to construct fully homomorphic encryption).
引用
收藏
页数:43
相关论文
共 50 条
  • [1] Achievable CCA2 Relaxation for Homomorphic Encryption
    Akavia, Adi
    Gentry, Craig
    Halevi, Shai
    Vald, Margarita
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 70 - 99
  • [2] Homomorphic encryption with CCA security
    Prabhakaran, Manoj
    Rosulek, Mike
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 667 - 678
  • [3] Miniature CCA2 PK encryption: Tight security without redundancy
    Boyen, Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 485 - 501
  • [4] Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message
    Bansal, Tarun Kumar
    Chang, Donghoon
    Sanadhya, Somitra Kumar
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 93 - 106
  • [5] Leakage-resilient Attribute-Based Encryption with CCA2 security
    Zhang, Leyou
    Shang, Yujie
    International Journal of Network Security, 2019, 21 (05) : 819 - 827
  • [6] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    SUN YinXia & LI Hui 1 Key Lab of Computer Networks and Information Security
    Science China(Information Sciences), 2010, 53 (10) : 2005 - 2015
  • [7] Aleakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei Zhou
    Bo Yang
    Hao Cheng
    Qing-long Wang
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 481 - 493
  • [8] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    YinXia Sun
    Hui Li
    Science China Information Sciences, 2010, 53 : 2005 - 2015
  • [10] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    Sun YinXia
    Li Hui
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (10) : 2005 - 2015