A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle

被引:6
|
作者
Gong, Linming [1 ]
Li, Shundong [1 ]
Mao, Qing [1 ]
Wang, Daoshun [2 ]
Dou, Jiawei [3 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[3] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian 710062, Peoples R China
关键词
Adaptive chosen ciphertext attack; Blocking CCA2; Decisional composite residuosity; Homomorphism; Shared base;
D O I
10.1016/j.tcs.2015.10.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this study, we consider the problem of constructing a homomorphic encryption scheme that is secure against adaptive chosen ciphertext attack (CCA2). This type of scheme has many applications in secure multi-party computation, electronic voting, and cloud storage and computation. We present an encryption scheme, based on the composite degree residuosity classes, which can block CCA2 while maintaining homomorphism. Our cryptosystem, which is based on standard modular arithmetic, is provable with indistinguishable security under CCA2. An additional contribution of this study is a new definition of preventing CCA2 (or blocking CCA2). (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:253 / 261
页数:9
相关论文
共 50 条
  • [1] On Homomorphic Encryption and Chosen-Ciphertext Security
    Hemenway, Brett
    Ostrovsky, Rafail
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 52 - 65
  • [2] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [3] A New Key-Aggregate Encryption Scheme with Chosen Ciphertext Security
    Lan, Caihui
    Li, Haifeng
    Wang, Caifen
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 229 - 233
  • [4] A novel hybrid encryption scheme against adaptive chosen ciphertext attack
    Qi, Zhifeng
    Oing, Sihan
    Yang, Yixian
    Cheng, Guanghui
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 811 - 814
  • [5] Chosen-ciphertext security of multiple encryption
    Dodis, Y
    Katz, J
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 188 - 209
  • [6] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243
  • [7] Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
    Joo, Chihong
    Yun, Aaram
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 173 - 192
  • [8] Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
    Maeda, Yusaku
    Nuida, Koji
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 209 - 228
  • [9] Minimizing Ciphertext in Homomorphic Encryption Scheme for Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 583 - 591
  • [10] Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Duong, Dung Hoang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2398 - 2408