Achievable CCA2 Relaxation for Homomorphic Encryption

被引:0
|
作者
Akavia, Adi [1 ]
Gentry, Craig [2 ]
Halevi, Shai [3 ]
Vald, Margarita [4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Cornami, New York, NY USA
[3] AWS, New York, NY USA
[4] Intuit Inc, Petah Tiqwa, Israel
关键词
Chosen plaintext attack; Chosen ciphertext attack; Homomorphic encryption; Cryptographic protocols; Client aided protocols; Functional bootstrapping oracle;
D O I
10.1007/s00145-024-09526-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Homomorphic encryption (HE) protects data in-use, but can be computationally expensive. To avoid the costly bootstrapping procedure that refreshes ciphertexts, some works have explored client-aided outsourcing protocols, where the client intermittently refreshes ciphertexts for a server that is performing homomorphic computations. But is this approach secure against malicious servers? We present a CPA-secure encryption scheme that is completely insecure in this setting. We define a new notion of security, called funcCPA , that we prove is sufficient. Additionally, we show:Homomorphic encryption schemes that have a certain type of circuit privacy-for example, schemes in which ciphertexts can be "sanitized"-are funcCPA-secure.In particular, assuming certain existing HE schemes are CPA-secure, they are also funcCPA-secure.For certain encryption schemes, like Brakerski-Vaikuntanathan, that have a property that we call oblivious secret key extraction, funcCPA-security implies circular security-i.e., that it is secure to provide an encryption of the secret key in a form usable for bootstrapping (to construct fully homomorphic encryption).
引用
收藏
页数:43
相关论文
共 50 条
  • [21] A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
    Dowsley, Rafael
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 240 - +
  • [22] CCA2 secure public-key encryption scheme tolerating continual leakage attacks
    Zhou, YanWei
    Yang, Bo
    Zhang, Wenzheng
    Mu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4505 - 4519
  • [23] RSA-type Encryption Schemes against CPA and CCA2 in Standard Model; [标准模型下抗CPA与抗CCA2的RSA型加密方案]
    Gong L.-M.
    Li S.-D.
    Dou J.-W.
    Wang D.-S.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2018, 46 (08): : 1938 - 1946
  • [24] A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme
    Dachman-Soled, Dana
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 37 - 55
  • [25] CCA-Secure Keyed-Fully Homomorphic Encryption
    Lai, Junzuo
    Deng, Robert H.
    Ma, Changshe
    Sakurai, Kouichi
    Weng, Jian
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 70 - 98
  • [26] A CCA2 Secure Variant of the McEliece Cryptosystem
    Doettling, Nico
    Dowsley, Rafael
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (10) : 6672 - 6680
  • [27] Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
    Zhao, Xingwen
    Zhang, Fangguo
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) : 708 - 716
  • [28] QC-MDPC: A Timing Attack and a CCA2 KEM
    Eaton, Edward
    Lequesne, Matthieu
    Parent, Alex
    Sendrier, Nicolas
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 47 - 76
  • [29] Analysis of Gong et al.'s CCA2-secure homomorphic encryption
    Lee, Hyung Tae
    Ling, San
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2016, 640 : 104 - 114
  • [30] CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (01) : 153 - 162