Paper 2022/017
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation
Shingo Sato and Keita Emura and Atsushi Takayasu
Abstract
(Fully) homomorphic encryption ((F)HE) allows users to publicly evaluate circuits on encrypted data. Although public homomorphic evaluation property has various applications, (F)HE cannot achieve security against chosen ciphertext attacks (CCA2) due to its nature. To achieve both the CCA2 security and homomorphic evaluation property, Emura et al. (PKC 2013) introduced keyed-homomorphic public key encryption (KH-PKE) and formalized its security denoted by KH-CCA security. KH-PKE has a homomorphic evaluation key that enables users to perform homomorphic operations. Intuitively, KH-PKE achieves the CCA2 security unless adversaries have a homomorphic evaluation key. Although Lai et al. (PKC 2016) proposed the first keyed-fully homomorphic encryption (keyed-FHE) scheme, its security relies on the indistinguishability obfuscation (iO), and this scheme satisfies a weak variant of KH-CCA security. Here, we propose a generic construction of a KH-CCA secure keyed-FHE scheme from an FHE scheme secure against non-adaptive chosen ciphertext attack (CCA1) and a strong dual-system simulation-sound non-interactive zero-knowledge (strong DSS-NIZK) argument system by using the Naor-Yung paradigm. We show that there are a strong DSS-NIZK and an IND-CCA1 secure FHE scheme that are suitable for our generic construction. This shows that there exists a keyed-FHE scheme from simpler primitives than iO.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Major revision. ACNS 2022
- Keywords
- Keyed-homomorphic public key encryptionKeyed-fully homomorphic encryptionStrong DSS-NIZK
- Contact author(s)
-
sato-shingo-zk @ ynu ac jp
k-emura @ nict go jp
takayasu-a @ g ecc u-tokyo ac jp - History
- 2023-09-20: revised
- 2022-01-08: received
- See all versions
- Short URL
- https://ia.cr/2022/017
- License
-
CC BY