Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

On the IND-CCA1 Security of FHE Schemes

View through CrossRef
Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arbitrary computations on encrypted material without having to decrypt it first. There are numerous FHE schemes, all of which are expanded from somewhat homomorphic encryption (SHE) schemes, and some of which are considered viable in practice. However, while these FHE schemes are semantically (IND-CPA) secure, the question of their IND-CCA1 security is much less studied, and we therefore provide an overview of the IND-CCA1 security of all acknowledged FHE schemes in this paper. To give this overview, we grouped the SHE schemes into broad categories based on their similarities and underlying hardness problems. For each category, we show that the SHE schemes are susceptible to either known adaptive key recovery attacks, a natural extension of known attacks, or our proposed attacks. Finally, we discuss the known techniques to achieve IND-CCA1-secure FHE and SHE schemes. We concluded that none of the proposed schemes were IND-CCA1-secure and that the known general constructions all had their shortcomings.
Title: On the IND-CCA1 Security of FHE Schemes
Description:
Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arbitrary computations on encrypted material without having to decrypt it first.
There are numerous FHE schemes, all of which are expanded from somewhat homomorphic encryption (SHE) schemes, and some of which are considered viable in practice.
However, while these FHE schemes are semantically (IND-CPA) secure, the question of their IND-CCA1 security is much less studied, and we therefore provide an overview of the IND-CCA1 security of all acknowledged FHE schemes in this paper.
To give this overview, we grouped the SHE schemes into broad categories based on their similarities and underlying hardness problems.
For each category, we show that the SHE schemes are susceptible to either known adaptive key recovery attacks, a natural extension of known attacks, or our proposed attacks.
Finally, we discuss the known techniques to achieve IND-CCA1-secure FHE and SHE schemes.
We concluded that none of the proposed schemes were IND-CCA1-secure and that the known general constructions all had their shortcomings.

Related Results

Secure Genomic String Search with Parallel Homomorphic Encryption
Secure Genomic String Search with Parallel Homomorphic Encryption
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today’s data security problems. While eff...
Outsourced Databases in the Cloud: A Privacy-Preserving Indexing Scheme
Outsourced Databases in the Cloud: A Privacy-Preserving Indexing Scheme
Abstract Cloud computing becomes a popular and successful paradigm for data outsourcing. Cloud computing has developed as an affordable and realistic alternative to in-hous...
Land use evolution over time using public data and a new environmental indicator. Application to the Valencia region (Spain)
Land use evolution over time using public data and a new environmental indicator. Application to the Valencia region (Spain)
<p>In this work a new environmental indicator for the analysis of land use change over time (ENV-IND) is presented. The ENV-IND indicator has been defined and assigne...
Comparison of Fully Homomorphic Encryption and Garbled Circuits approaches in Privacy-Preserving Machine Learning
Comparison of Fully Homomorphic Encryption and Garbled Circuits approaches in Privacy-Preserving Machine Learning
Machine Learning (ML) is making its way into fields such as healthcare, finance, and natural language processing (NLP), and concerns over data privacy and model confidentiality con...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Mapping Welfare and Development Schemes to SDGs at the Village Level in India
Mapping Welfare and Development Schemes to SDGs at the Village Level in India
The paper examines relationship between the various development and welfare schemes and the SDGs at the village level in India. The objective of the paper is to enlist of the schem...
Intensity and Prevalence of Ectoparasites in Carp in Cirata Reservoir KJA, Cianjur Regency, West Java
Intensity and Prevalence of Ectoparasites in Carp in Cirata Reservoir KJA, Cianjur Regency, West Java
One of the problems that arise in fish farming is the occurrence of disease attacks that can cause losses to farmers. Parasites that are classified as ectoparasites themselves usua...

Back to Top