Homomorphic encryption with CCA security

被引:0
|
作者
Prabhakaran, Manoj [1 ]
Rosulek, Mike [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address the problem of constructing public-key encryption schemes that meaningfully combine useful computability features with non-malleability. In particular, we investigate schemes in which anyone can change an encryption of an unknown message m into an encryption of T(m) (as a feature), for a specific set of allowed functions T, but the scheme is "non-malleable" with respect to all other operations. We formulate precise definitions that capture these intuitive requirements and also show relationships among our new definitions and other more standard ones (IND-CCA, gCCA, and RCCA). We further justify our definitions by showing their equivalence to a natural formulation of security in the Universally Composable framework. We also consider extending the definitions to features which combine multiple ciphertexts, and show that a natural definition is unattainable for a useful class of features. Finally, we describe a new family of encryption schemes that satisfy our definitions for a wide variety of allowed transformations T, and which are secure under the standard Decisional Diffie-Hellman (DDH) assumption.
引用
收藏
页码:667 / 678
页数:12
相关论文
共 50 条
  • [1] On the security of multiple encryption or CCA-security plus CCA-security=CCA-security?
    Zhang, R
    Hanaoka, G
    Shikata, J
    Imai, H
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 360 - 374
  • [2] Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through Verifiability
    Manulis, Mark
    Nguyen, Jerome
    ADVANCES IN CRYPTOLOGY, PT II, EUROCRYPT 2024, 2024, 14652 : 63 - 93
  • [3] SoK: Towards CCA Secure Fully Homomorphic Encryption
    Okada, Hiroki
    Fukushima, Kazuhide
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 793 - 798
  • [4] Achievable CCA2 Relaxation for Homomorphic Encryption
    Akavia, Adi
    Gentry, Craig
    Halevi, Shai
    Vald, Margarita
    JOURNAL OF CRYPTOLOGY, 2025, 38 (01)
  • [5] Achievable CCA2 Relaxation for Homomorphic Encryption
    Akavia, Adi
    Gentry, Craig
    Halevi, Shai
    Vald, Margarita
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 70 - 99
  • [6] CCA-Secure Keyed-Fully Homomorphic Encryption
    Lai, Junzuo
    Deng, Robert H.
    Ma, Changshe
    Sakurai, Kouichi
    Weng, Jian
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 70 - 98
  • [7] Limits of Provable Security for Homomorphic Encryption
    Bogdanov, Andrej
    Lee, Chin Ho
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 111 - 128
  • [8] Cloud Security based on the Homomorphic Encryption
    Al-Sit, Waleed T.
    Al-Zoubi, Hani
    Al-Jubouri, Qussay
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 300 - 307
  • [9] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [10] On the Security of Homomorphic Encryption on Approximate Numbers
    Li, Baiyu
    Micciancio, Daniele
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 648 - 677