Homomorphic authenticated encryption secure against chosen-ciphertext attack

Chihong Joo, Aaram Yun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

21 Scopus citations

Abstract

We study homomorphic authenticated encryption, where privacy and authenticity of data are protected simultaneously. We define homomorphic versions of various security notions for privacy and authenticity, and investigate relations between them. In particular, we show that it is possible to give a natural definition of IND-CCA for homomorphic authenticated encryption, unlike the case of homomorphic encryption. Also, we construct a simple homomorphic authenticated encryption scheme supporting arithmetic circuits, which is chosen-ciphertext secure both for privacy and authenticity. Our scheme is based on the error-free approximate GCD assumption.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II
EditorsPalash Sarkar, Tetsu Iwata
PublisherSpringer Verlag
Pages173-192
Number of pages20
ISBN (Electronic)9783662456071
DOIs
StatePublished - 2014
Event20th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2014 - Kaoshiung, Taiwan, Province of China
Duration: 7 Dec 201411 Dec 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8874
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2014
Country/TerritoryTaiwan, Province of China
CityKaoshiung
Period7/12/1411/12/14

Bibliographical note

Publisher Copyright:
© International Association for Cryptologic Research 2014.

Keywords

  • Homomorphic authenticated encryption
  • Homomorphic encryption
  • Homomorphic MAC

Fingerprint

Dive into the research topics of 'Homomorphic authenticated encryption secure against chosen-ciphertext attack'. Together they form a unique fingerprint.

Cite this