Achievable CCA2 Relaxation for Homomorphic Encryption

被引:0
|
作者
Akavia, Adi [1 ]
Gentry, Craig [2 ]
Halevi, Shai [3 ]
Vald, Margarita [4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Cornami, New York, NY USA
[3] AWS, New York, NY USA
[4] Intuit Inc, Petah Tiqwa, Israel
关键词
Chosen plaintext attack; Chosen ciphertext attack; Homomorphic encryption; Cryptographic protocols; Client aided protocols; Functional bootstrapping oracle;
D O I
10.1007/s00145-024-09526-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Homomorphic encryption (HE) protects data in-use, but can be computationally expensive. To avoid the costly bootstrapping procedure that refreshes ciphertexts, some works have explored client-aided outsourcing protocols, where the client intermittently refreshes ciphertexts for a server that is performing homomorphic computations. But is this approach secure against malicious servers? We present a CPA-secure encryption scheme that is completely insecure in this setting. We define a new notion of security, called funcCPA , that we prove is sufficient. Additionally, we show:Homomorphic encryption schemes that have a certain type of circuit privacy-for example, schemes in which ciphertexts can be "sanitized"-are funcCPA-secure.In particular, assuming certain existing HE schemes are CPA-secure, they are also funcCPA-secure.For certain encryption schemes, like Brakerski-Vaikuntanathan, that have a property that we call oblivious secret key extraction, funcCPA-security implies circular security-i.e., that it is secure to provide an encryption of the secret key in a form usable for bootstrapping (to construct fully homomorphic encryption).
引用
收藏
页数:43
相关论文
共 50 条
  • [41] Bounded CCA2-secure encryption
    Cramer, Ronald
    Hanaoka, Goichiro
    Hofheinz, Dennis
    Imai, Hideki
    Kiltz, Eike
    Pass, Rafael
    Shelat, Abhi
    Vaikuntanathan, Vinod
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 502 - +
  • [42] 高效弹性泄漏下CCA2安全公钥加密体制
    张明武
    陈泌文
    何德彪
    杨波
    计算机学报, 2016, 39 (03) : 492 - 502
  • [43] Homomorphic Encryption in the Cloud
    Hrestak, Darko
    Picek, Stjepan
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1400 - 1404
  • [44] Subring Homomorphic Encryption
    Arita, Seiko
    Handa, Sari
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 112 - 136
  • [45] Parallel Homomorphic Encryption
    Kamara, Seny
    Raykova, Mariana
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2013 WORKSHOPS, 2013, 7862 : 213 - 225
  • [46] A Method of Homomorphic Encryption
    XIANG Guang-li~ 1
    2. School of Computer
    3. School of Information
    WuhanUniversityJournalofNaturalSciences, 2006, (01) : 181 - 184
  • [47] Homomorphic image encryption
    Elashry, Ibrahim F.
    Allah, Osama S. Farag
    Abbas, Alaa M.
    El-Rabaie, S.
    Abd El-Samie, Fathi E.
    JOURNAL OF ELECTRONIC IMAGING, 2009, 18 (03)
  • [48] Homomorphic Encryption on GPU
    Ozcan, Ali Sah
    Ayduman, Can
    Turkoglu, Enes Recep
    Savas, Erkay
    IEEE ACCESS, 2023, 11 : 84168 - 84186
  • [49] Combinatorially Homomorphic Encryption
    Ishai, Yuval
    Kushnir, Eyal
    Rothblum, Ron D.
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 251 - 278
  • [50] Noiseless homomorphic encryption for complex numbers and fully homomorphic encryption with modular arithmetic
    Chun, Jonghee
    Han, Hee
    Kang, Stefano V.
    Wang, Hyo Keun
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2024,