Abstract
Homomorphic encryption (HE) protects data in-use, but can be computationally expensive. To avoid the costly bootstrapping procedure that refreshes ciphertexts, some works have explored client-aided outsourcing protocols, where the client intermittently refreshes ciphertexts for a server that is performing homomorphic computations. But is this approach secure against malicious servers? We present a CPA-secure encryption scheme that is completely insecure in this setting. We define a new notion of security, called funcCPA, that we prove is sufficient. Additionally, we show: Homomorphic encryption schemes that have a certain type of circuit privacy – for example, schemes in which ciphertexts can be “sanitized" – are funcCPA-secure.In particular, assuming certain existing HE schemes are CPA-secure, they are also funcCPA-secure.For certain encryption schemes, like Brakerski-Vaikuntanathan, that have a property that we call oblivious secret key extraction, funcCPA-security implies circular security – i.e., that it is secure to provide an encryption of the secret key in a form usable for bootstrapping (to construct fully homomorphic encryption). Namely, funcCPA-security lies strictly between CPA-security and CCA2-security (under reasonable assumptions), and has an interesting relationship with circular security, though it is not known to be equivalent.
| Original language | English |
|---|---|
| Title of host publication | Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings |
| Editors | Eike Kiltz, Vinod Vaikuntanathan |
| Publisher | Springer Science and Business Media Deutschland GmbH |
| Pages | 70-99 |
| Number of pages | 30 |
| ISBN (Print) | 9783031223648 |
| DOIs | |
| State | Published - 2022 |
| Event | 20th Theory of Cryptography Conference, TCC 2022 - Chicago, United States Duration: 7 Nov 2022 → 10 Nov 2022 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Volume | 13748 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 20th Theory of Cryptography Conference, TCC 2022 |
|---|---|
| Country/Territory | United States |
| City | Chicago |
| Period | 7/11/22 → 10/11/22 |
Bibliographical note
Publisher Copyright:© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science