Homomorphic Encryption with CCA Security
نویسندگان
چکیده
We address the problem of constructing public-key encryption schemes that meaningfullycombine useful computability features with non-malleability. In particular, we investigate schemesin which anyone can change an encryption of an unknown message m into an encryption of T (m)(as a feature), for a specific set of allowed functions T , but the scheme is “non-malleable” withrespect to all other operations. We formulate precise definitions that capture these intuitive re-quirements and also show relationships among our new definitions and other more standard ones(IND-CCA, gCCA, and RCCA). We further justify our definitions by showing their equivalenceto a natural formulation of security in the Universally Composable framework. We also considerextending the definitions to features which combine multiple ciphertexts, and show that a nat-ural definition is unattainable for a useful class of features. Finally, we describe a new family ofencryption schemes that satisfy our definitions for a wide variety of allowed transformations T ,and which are secure under the standard Decisional Diffie-Hellman (DDH) assumption. ∗An extended abstract of this work appears in Automata, Languages and Programming, 35th International Collo-quium, ICALP 2008, Springer-Verlag, 2008. This full version is available from http://eprint.iacr.org/2008/079.†Department of Computer Science, University of Illinois, Urbana-Champaign. {mmp,rosulek}@uiuc.edu. Partiallysupported by NSF grant CNS 07-47027.
منابع مشابه
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers
The notion of fully homomorphic encryption is very important since it enables many important applications, such as the cloud computing scenario. In EUROCRYPT 2010, van Dijk, Gentry, Halevi and Vaikuntanathan proposed an interesting fully homomorphic encryption scheme based on a somewhat homomorphic encryption scheme using integers. In this paper, we demonstrate a very practical CCA-1 attack aga...
متن کاملOn CCA-Secure Somewhat Homomorphic Encryption
It is well known that any encryption scheme which supports any form of homomorphic operation cannot be secure against adaptive chosen ciphertext attacks. The question then arises as to what is the most stringent security definition which is achievable by homomorphic encryption schemes. Prior work has shown that various schemes which support a single homomorphic encryption scheme can be shown to...
متن کاملChosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
In homomorphic encryption schemes, anyone can perform homomorphic operations, and therefore, it is difficult to manage when, where and by whom they are performed. In addition, the property that anyone can “freely” perform the operation inevitably means that ciphertexts are malleable, and it is well-known that adaptive chosen ciphertext (CCA) security and the homomorphic property can never be ac...
متن کاملOn Homomorphic Encryption and Chosen-Ciphertext Security
Chosen-Ciphertext (IND-CCA) security is generally considered the right notion of security for a cryptosystem. Because of its central importance much effort has been devoted to constructing IND-CCA secure cryptosystems. In this work, we consider constructing IND-CCA secure cryptosystems from (group) homomorphic encryption. Our main results give natural and efficient constructions of IND-CCA secu...
متن کاملHomomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected simultaneously. We define homomorphic versions of various security notions for privacy and authenticity, and investigate relations between them. In particular, we show that it is possible to give a natural definition of IND-CCA for homomorphic authenticated encryption, unlike the case of homomorp...
متن کاملThreshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is often dangerous to give to only one people the power of decryption. Therefore, threshold cryptosystems aimed at distributing the decryption ability. However, only two efficient such schemes have been proposed so far for achievin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2008 شماره
صفحات -
تاریخ انتشار 2008