Homomorphic encryption with CCA security

被引:0
|
作者
Prabhakaran, Manoj [1 ]
Rosulek, Mike [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address the problem of constructing public-key encryption schemes that meaningfully combine useful computability features with non-malleability. In particular, we investigate schemes in which anyone can change an encryption of an unknown message m into an encryption of T(m) (as a feature), for a specific set of allowed functions T, but the scheme is "non-malleable" with respect to all other operations. We formulate precise definitions that capture these intuitive requirements and also show relationships among our new definitions and other more standard ones (IND-CCA, gCCA, and RCCA). We further justify our definitions by showing their equivalence to a natural formulation of security in the Universally Composable framework. We also consider extending the definitions to features which combine multiple ciphertexts, and show that a natural definition is unattainable for a useful class of features. Finally, we describe a new family of encryption schemes that satisfy our definitions for a wide variety of allowed transformations T, and which are secure under the standard Decisional Diffie-Hellman (DDH) assumption.
引用
收藏
页码:667 / 678
页数:12
相关论文
共 50 条
  • [21] Homomorphic Encryption atWork for Private Analysis of Security Logs
    Boudguiga, Aymen
    Stan, Oana
    Sedjelmaci, Hichem
    Carpov, Sergiu
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 515 - 523
  • [22] Efficient Homomorphic Encryption with Key Rotation and Security Update
    Aono, Yoshinori
    Hayashi, Takuya
    Le Trieu Phong
    Wang, Lihua
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 39 - 50
  • [23] Survey on homomorphic encryption and its applications to cloud security
    Li, Shundong
    Dou, Jiawei
    Wang, Daoshun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (06): : 1378 - 1388
  • [24] On the Security of Homomorphic Encryption Schemes with Restricted Decryption Oracles
    MA Guangsheng
    LI Hongbo
    JournalofSystemsScience&Complexity, 2024, 37 (05) : 2240 - 2261
  • [25] Data Security in Recommendation System Using Homomorphic Encryption
    Soni, Kajol
    Panchal, Gaurang
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 308 - 313
  • [26] Comprehensively enhancing the security of control with combined homomorphic encryption
    Sui, Tongtong
    Wang, Jizhi
    Liu, Wen
    Wang, Lizhen
    Kong, Lingrui
    Zhao, Yue
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [27] On the Security of Homomorphic Encryption Schemes with Restricted Decryption Oracles
    Ma, Guangsheng
    Li, Hongbo
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2024, 37 (05) : 2240 - 2261
  • [28] Symmetric quantum fully homomorphic encryption with perfect security
    Min Liang
    Quantum Information Processing, 2013, 12 : 3675 - 3687
  • [29] Enhancement in Homomorphic Encryption Scheme for Cloud Data Security
    Kaur, Samjot
    Wasson, Vikas
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 54 - 59
  • [30] A lightweight fully homomorphic encryption scheme for cloud security
    Biksham, V.
    Vasumathi, D.
    International Journal of Information and Computer Security, 2020, 13 (3-4) : 357 - 371