A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle

被引:6
|
作者
Gong, Linming [1 ]
Li, Shundong [1 ]
Mao, Qing [1 ]
Wang, Daoshun [2 ]
Dou, Jiawei [3 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[3] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian 710062, Peoples R China
关键词
Adaptive chosen ciphertext attack; Blocking CCA2; Decisional composite residuosity; Homomorphism; Shared base;
D O I
10.1016/j.tcs.2015.10.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this study, we consider the problem of constructing a homomorphic encryption scheme that is secure against adaptive chosen ciphertext attack (CCA2). This type of scheme has many applications in secure multi-party computation, electronic voting, and cloud storage and computation. We present an encryption scheme, based on the composite degree residuosity classes, which can block CCA2 while maintaining homomorphism. Our cryptosystem, which is based on standard modular arithmetic, is provable with indistinguishable security under CCA2. An additional contribution of this study is a new definition of preventing CCA2 (or blocking CCA2). (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:253 / 261
页数:9
相关论文
共 50 条
  • [31] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [32] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [33] Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
    Qiu, JunJie
    Hwang, Gi-Hyun
    Lee, HoonJae
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 104 - 110
  • [34] Enhancement in Homomorphic Encryption Scheme for Cloud Data Security
    Kaur, Samjot
    Wasson, Vikas
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 54 - 59
  • [35] A lightweight fully homomorphic encryption scheme for cloud security
    Biksham, V.
    Vasumathi, D.
    [J]. International Journal of Information and Computer Security, 2020, 13 (3-4) : 357 - 371
  • [36] Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
    Deng, Robert H.
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 1 - +
  • [37] Provable secure leakage-resilient predicate encryption scheme without random oracle
    Zhang, Xiujie
    Xu, Chunxiang
    Li, Wanpeng
    [J]. Journal of Computational Information Systems, 2013, 9 (12): : 4681 - 4689
  • [38] Adaptively anonymous public-key broadcast encryption scheme without random oracle
    Wang, Hao
    Wu, Lei
    [J]. Journal of Networks, 2014, 9 (06) : 1656 - 1663
  • [39] Attribute-Based Fully Homomorphic Encryption Scheme from Lattices with Short Ciphertext
    Liu, Yuan
    Pan, Yun
    Gu, Lize
    Zhang, Yuan
    An, Dezhi
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [40] Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes
    Wang, Xu An
    Nie, Jinting
    Wang, Wei
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 507 - 510