Javascript must be enabled to continue!
On the IND-CCA1 Security of FHE Schemes
View through CrossRef
Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arbitrary computations on encrypted material without having to decrypt it first. There are numerous FHE schemes, all of which are expanded from somewhat homomorphic encryption (SHE) schemes, and some of which are considered viable in practice. However, while these FHE schemes are semantically (IND-CPA) secure, the question of their IND-CCA1 security is much less studied, and we therefore provide an overview of the IND-CCA1 security of all acknowledged FHE schemes in this paper. To give this overview, we grouped the SHE schemes into broad categories based on their similarities and underlying hardness problems. For each category, we show that the SHE schemes are susceptible to either known adaptive key recovery attacks, a natural extension of known attacks, or our proposed attacks. Finally, we discuss the known techniques to achieve IND-CCA1-secure FHE and SHE schemes. We concluded that none of the proposed schemes were IND-CCA1-secure and that the known general constructions all had their shortcomings.
Title: On the IND-CCA1 Security of FHE Schemes
Description:
Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arbitrary computations on encrypted material without having to decrypt it first.
There are numerous FHE schemes, all of which are expanded from somewhat homomorphic encryption (SHE) schemes, and some of which are considered viable in practice.
However, while these FHE schemes are semantically (IND-CPA) secure, the question of their IND-CCA1 security is much less studied, and we therefore provide an overview of the IND-CCA1 security of all acknowledged FHE schemes in this paper.
To give this overview, we grouped the SHE schemes into broad categories based on their similarities and underlying hardness problems.
For each category, we show that the SHE schemes are susceptible to either known adaptive key recovery attacks, a natural extension of known attacks, or our proposed attacks.
Finally, we discuss the known techniques to achieve IND-CCA1-secure FHE and SHE schemes.
We concluded that none of the proposed schemes were IND-CCA1-secure and that the known general constructions all had their shortcomings.
Related Results
Secure Genomic String Search with Parallel Homomorphic Encryption
Secure Genomic String Search with Parallel Homomorphic Encryption
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today’s data security problems. While eff...
Outsourced Databases in the Cloud: A Privacy-Preserving Indexing Scheme
Outsourced Databases in the Cloud: A Privacy-Preserving Indexing Scheme
Abstract
Cloud computing becomes a popular and successful paradigm for data outsourcing. Cloud computing has developed as an affordable and realistic alternative to in-hous...
Perlindungan Hukum Terhadap Konsumen Tabung Baja Elpiji Berdasarkan Undang-Undang Nomor 8 Tahun 1999 Tentang Perlindungan Konsumen Jo Peraturan Menteri Perindustrian Nomor 47/M-IND/PER/3/2012
Perlindungan Hukum Terhadap Konsumen Tabung Baja Elpiji Berdasarkan Undang-Undang Nomor 8 Tahun 1999 Tentang Perlindungan Konsumen Jo Peraturan Menteri Perindustrian Nomor 47/M-IND/PER/3/2012
Abstract. National development aims to create a just and prosperous society based on law. Economic development in the era of globalization must be able to support the growth of the...
Institutional innovations for improved water security in smallholder irrigation schemes in KwaZulu-Natal and Eastern Cape Provinces, South Africa
Institutional innovations for improved water security in smallholder irrigation schemes in KwaZulu-Natal and Eastern Cape Provinces, South Africa
Smallholder irrigation schemes are regarded as a key strategy to eliminate poverty and increase food security in rural areas in South Africa. While the South African government has...
Land use evolution over time using public data and a new environmental indicator. Application to the Valencia region (Spain)
Land use evolution over time using public data and a new environmental indicator. Application to the Valencia region (Spain)
<p>In this work a new environmental indicator for the analysis of land use change over time (ENV-IND) is presented. The ENV-IND indicator has been defined and assigne...
Comparison of Fully Homomorphic Encryption and Garbled Circuits approaches in Privacy-Preserving Machine Learning
Comparison of Fully Homomorphic Encryption and Garbled Circuits approaches in Privacy-Preserving Machine Learning
Machine Learning (ML) is making its way into fields such as healthcare, finance, and natural language processing (NLP), and concerns over data privacy and model confidentiality con...
Closing the Loop with the Well Integrity: Deploying High-Definition Acoustic and Temperature Logging for Detecting Complex Multi Annuli Communication and Integration of Geochemical Analysis
Closing the Loop with the Well Integrity: Deploying High-Definition Acoustic and Temperature Logging for Detecting Complex Multi Annuli Communication and Integration of Geochemical Analysis
Abstract
The integrity of a well system is crucial for ensuring optimized and safe flow. However, current methods and technologies used to assess well system integri...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...

