A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle

被引:6
|
作者
Gong, Linming [1 ]
Li, Shundong [1 ]
Mao, Qing [1 ]
Wang, Daoshun [2 ]
Dou, Jiawei [3 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[3] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian 710062, Peoples R China
关键词
Adaptive chosen ciphertext attack; Blocking CCA2; Decisional composite residuosity; Homomorphism; Shared base;
D O I
10.1016/j.tcs.2015.10.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this study, we consider the problem of constructing a homomorphic encryption scheme that is secure against adaptive chosen ciphertext attack (CCA2). This type of scheme has many applications in secure multi-party computation, electronic voting, and cloud storage and computation. We present an encryption scheme, based on the composite degree residuosity classes, which can block CCA2 while maintaining homomorphism. Our cryptosystem, which is based on standard modular arithmetic, is provable with indistinguishable security under CCA2. An additional contribution of this study is a new definition of preventing CCA2 (or blocking CCA2). (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:253 / 261
页数:9
相关论文
共 50 条
  • [41] Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
    Guo, Lifeng
    Hu, Lei
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (01) : 151 - 157
  • [42] New constructions of constant size ciphertext HIBE without random oracle
    Chatterjee, Sanjit
    Sarkar, Palash
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 310 - +
  • [43] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    [J]. TECHNOLOGIES, 2019, 7 (01):
  • [44] SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME
    Li, Jian
    Chen, Sicong
    Song, Danjie
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 224 - 227
  • [45] Public key searchable encryption without random oracle
    [J]. Zhang, X. (zxf071714229@hotmail.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [46] A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 248 - +
  • [47] An Efficient Ciphertext Retrieval Scheme Based on Homomorphic Encryption for Multiple Data Owners in Hybrid Cloud
    He, Heng
    Chen, Renju
    Liu, Chengyu
    Feng, Ke
    Zhou, Xiaohu
    [J]. IEEE ACCESS, 2021, 9 : 168547 - 168557
  • [48] Adaptive chosen ciphertext secure threshold key escrow scheme from pairing
    Long, Yu
    Chen, Kefei
    Liu, Shengli
    [J]. INFORMATICA, 2006, 17 (04) : 519 - 534
  • [49] A Tight Security Reduction Designated Verifier Proxy Signature Scheme Without Random Oracle
    Hu, Xiaoming
    Lu, Hong
    Liu, Yan
    Wang, Jian
    Tan, Wenan
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT I, 2015, 9155 : 98 - 109
  • [50] Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
    Hemenway, Brett
    Libert, Benoit
    Ostrovsky, Rafail
    Vergnaud, Damien
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 70 - +