TY - GEN
T1 - Homomorphic authenticated encryption secure against chosen-ciphertext attack
AU - Joo, Chihong
AU - Yun, Aaram
N1 - Publisher Copyright:
© International Association for Cryptologic Research 2014.
PY - 2014
Y1 - 2014
N2 - We study homomorphic authenticated encryption, where privacy and authenticity of data are protected simultaneously. We define homomorphic versions of various security notions for privacy and authenticity, and investigate relations between them. In particular, we show that it is possible to give a natural definition of IND-CCA for homomorphic authenticated encryption, unlike the case of homomorphic encryption. Also, we construct a simple homomorphic authenticated encryption scheme supporting arithmetic circuits, which is chosen-ciphertext secure both for privacy and authenticity. Our scheme is based on the error-free approximate GCD assumption.
AB - We study homomorphic authenticated encryption, where privacy and authenticity of data are protected simultaneously. We define homomorphic versions of various security notions for privacy and authenticity, and investigate relations between them. In particular, we show that it is possible to give a natural definition of IND-CCA for homomorphic authenticated encryption, unlike the case of homomorphic encryption. Also, we construct a simple homomorphic authenticated encryption scheme supporting arithmetic circuits, which is chosen-ciphertext secure both for privacy and authenticity. Our scheme is based on the error-free approximate GCD assumption.
KW - Homomorphic authenticated encryption
KW - Homomorphic encryption
KW - Homomorphic MAC
UR - http://www.scopus.com/inward/record.url?scp=84916211349&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-45608-8_10
DO - 10.1007/978-3-662-45608-8_10
M3 - Conference contribution
AN - SCOPUS:84916211349
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 173
EP - 192
BT - Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II
A2 - Sarkar, Palash
A2 - Iwata, Tetsu
PB - Springer Verlag
T2 - 20th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2014
Y2 - 7 December 2014 through 11 December 2014
ER -