TY - GEN
T1 - Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
AU - Maeda, Yusaku
AU - Nuida, Koji
N1 - Funding Information:
Acknowledgement. This research was partially supported by the Ministry of Internal Affairs and Communications SCOPE Grant Number 182103105, JST CREST JPMJCR19F6, and JSPS KAKENHI Grant Number 19H01109.
Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - Homomorphic encryption (HE) is a useful variant of public key encryption (PKE), but it has a drawback that HE cannot fully achieve IND-CCA2 security, a standard security notion for PKE. Emura et al. (PKC 2013) proposed a “keyed" version of HE, called KH-PKE, which introduces a separate key for homomorphic evaluation and then achieves security close to IND-CCA2. Current KH-PKE schemes are classified into ones supporting only a single kind of homomorphic operation (addition or multiplication) and others that are fully homomorphic but are consequently not very efficient; no intermediate schemes with both efficiency and richer functionality are known so far. In this paper, we propose a “two-level" KH-PKE scheme for evaluating degree-two polynomials, by cleverly combining Emura et al.’s generic framework with a recent efficient two-level HE by Attrapadung et al. (ASIACCS 2018).
AB - Homomorphic encryption (HE) is a useful variant of public key encryption (PKE), but it has a drawback that HE cannot fully achieve IND-CCA2 security, a standard security notion for PKE. Emura et al. (PKC 2013) proposed a “keyed" version of HE, called KH-PKE, which introduces a separate key for homomorphic evaluation and then achieves security close to IND-CCA2. Current KH-PKE schemes are classified into ones supporting only a single kind of homomorphic operation (addition or multiplication) and others that are fully homomorphic but are consequently not very efficient; no intermediate schemes with both efficiency and richer functionality are known so far. In this paper, we propose a “two-level" KH-PKE scheme for evaluating degree-two polynomials, by cleverly combining Emura et al.’s generic framework with a recent efficient two-level HE by Attrapadung et al. (ASIACCS 2018).
UR - http://www.scopus.com/inward/record.url?scp=85145019014&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85145019014&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-22301-3_11
DO - 10.1007/978-3-031-22301-3_11
M3 - Conference contribution
AN - SCOPUS:85145019014
SN - 9783031223006
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 209
EP - 228
BT - Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings
A2 - Nguyen, Khoa
A2 - Yang, Guomin
A2 - Guo, Fuchun
A2 - Susilo, Willy
PB - Springer Science and Business Media Deutschland GmbH
T2 - 27th Australasian Conference on Information Security and Privacy, ACISP 2022
Y2 - 28 November 2022 through 30 November 2022
ER -