Paper 2021/1417

How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption

Koji Nuida

Abstract

We consider a setting of two-party computation between a server and a client where every message received by the server is encrypted by a fully homomorphic encryption (FHE) scheme and its decryption key is held by the client only. Akavia and Vald (IACR ePrint Archive, 2021) revisited the privacy problem in such protocols against malicious servers and revealed (as opposed to a naive expectation) that under certain condition, a malicious server can recover the client's input even if the underlying FHE scheme is IND-CPA secure. They also gave some sufficient conditions for the FHE scheme to ensure the privacy against malicious servers. However, their argument did not consider the possibility that a query from a malicious server to a client involves an invalid ciphertext. In this paper, we show, by giving a concrete example, that if such an invalid query is just rejected by the client, then the sufficient conditions in Akavia and Vald's result do not in general ensure the privacy against malicious servers. We also propose another option to handle an invalid query in a way that the client returns a random ciphertext (without explicitly rejecting the query), and show that such a protocol is private against malicious servers if the underlying FHE scheme is IND-CPA secure, sanitizable (in the sense of Ducas and Stehl\'{e}, EUROCRYPT 2016), and circular secure.

Note: (Version 2) only minor changes

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint. MINOR revision.
Keywords
multiparty computationhomomorphic encryptionmalicious security
Contact author(s)
nuida @ imi kyushu-u ac jp
History
2022-04-04: revised
2021-10-24: received
See all versions
Short URL
https://ia.cr/2021/1417
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1417,
      author = {Koji Nuida},
      title = {How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption},
      howpublished = {Cryptology ePrint Archive, Paper 2021/1417},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/1417}},
      url = {https://eprint.iacr.org/2021/1417}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.