Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Analysis of Gong et al.'s CCA2-secure homomorphic encryption

Full metadata record
DC Field Value Language
dc.contributor.authorLee, H.T.-
dc.contributor.authorLing, S.-
dc.contributor.authorWang, H.-
dc.date.accessioned2023-03-08T16:53:47Z-
dc.date.available2023-03-08T16:53:47Z-
dc.date.issued2016-08-
dc.identifier.issn0304-3975-
dc.identifier.issn1879-2294-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/64171-
dc.description.abstractIt is a well-known result that homomorphic encryption is not secure against adaptive chosen ciphertext attacks (CCA2) because of its malleable property. Very recently, however, Gong et al. proposed a construction asserted to be a CCA2-secure additively homomorphic encryption (AHE) scheme; in their construction, the adversary is not able to obtain a correct answer when querying the decryption oracle on a ciphertext obtained by modifying the challenge ciphertext (Theoretical Computer Science, 2016). Because their construction is very similar to Paillier's AHE, it appeared to support an additively homomorphic property, though they did not specify an evaluation algorithm for the scheme in their paper. In this paper, we present a simple CCA2 attack on their construction by re-randomizing the challenge ciphertext. Furthermore, we look into an additively homomorphic property of their construction. To do this, we first consider a typical candidate for an addition algorithm on ciphertexts, as provided for previous AHE constructions, and establish that it does not function correctly. Subsequently, we provide plausible evidence for the hardness of achieving an additively homomorphic property with their construction. According to our analysis, it seems hard to preserve an additively homomorphic property of their construction without any modification. In addition, as a minor contribution, we point out a flaw in the decryption algorithm of their construction and present a rectified algorithm for correct decryption.-
dc.format.extent11-
dc.language영어-
dc.language.isoENG-
dc.publisherElsevier B.V.-
dc.titleAnalysis of Gong et al.'s CCA2-secure homomorphic encryption-
dc.typeArticle-
dc.identifier.doi10.1016/j.tcs.2016.06.014-
dc.identifier.bibliographicCitationTheoretical Computer Science, v.640, pp 104 - 114-
dc.description.isOpenAccessY-
dc.identifier.wosid000380074300009-
dc.identifier.scopusid2-s2.0-84990848479-
dc.citation.endPage114-
dc.citation.startPage104-
dc.citation.titleTheoretical Computer Science-
dc.citation.volume640-
dc.type.docTypeArticle-
dc.publisher.location네델란드-
dc.subject.keywordAuthorAdaptive chosen ciphertext attack-
dc.subject.keywordAuthorAdditively homomorphic encryption-
dc.subject.keywordAuthorMalleability-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClasssci-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
Appears in
Collections
College of Software > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Hyungtae photo

Lee, Hyungtae
소프트웨어대학 (소프트웨어학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE