Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption

Yusaku Maeda, Koji Nuida

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Homomorphic encryption (HE) is a useful variant of public key encryption (PKE), but it has a drawback that HE cannot fully achieve IND-CCA2 security, a standard security notion for PKE. Emura et al. (PKC 2013) proposed a “keyed" version of HE, called KH-PKE, which introduces a separate key for homomorphic evaluation and then achieves security close to IND-CCA2. Current KH-PKE schemes are classified into ones supporting only a single kind of homomorphic operation (addition or multiplication) and others that are fully homomorphic but are consequently not very efficient; no intermediate schemes with both efficiency and richer functionality are known so far. In this paper, we propose a “two-level" KH-PKE scheme for evaluating degree-two polynomials, by cleverly combining Emura et al.’s generic framework with a recent efficient two-level HE by Attrapadung et al. (ASIACCS 2018).

Original languageEnglish
Title of host publicationInformation Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings
EditorsKhoa Nguyen, Guomin Yang, Fuchun Guo, Willy Susilo
PublisherSpringer Science and Business Media Deutschland GmbH
Pages209-228
Number of pages20
ISBN (Print)9783031223006
DOIs
Publication statusPublished - 2022
Event27th Australasian Conference on Information Security and Privacy, ACISP 2022 - Wollongong, Australia
Duration: Nov 28 2022Nov 30 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13494 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference27th Australasian Conference on Information Security and Privacy, ACISP 2022
Country/TerritoryAustralia
CityWollongong
Period11/28/2211/30/22

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption'. Together they form a unique fingerprint.

Cite this