Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
- Jonathan KatzAffiliated withDepartment of Computer Science, University of Maryland
- , Aishwarya ThiruvengadamAffiliated withDepartment of Computer Science, University of Maryland
- , Hong-Sheng ZhouAffiliated withDepartment of Computer Science, University of Maryland
Fully homomorphic encryption (FHE) is a form of public-key encryption that enables arbitrary computation over encrypted data. The past few years have seen several realizations of FHE under different assumptions, and FHE has been used as a building block in many cryptographic applications.
Adaptive security for public-key encryption schemes is an important security notion proposed by Canetti et al. It is intended to ensure security when encryption is used within an interactive protocol and parties may be adaptively corrupted by an adversary during the course of the protocol execution. Due to the extensive applications of FHE to protocol design, it is natural to understand whether adaptively secure FHE is achievable.
In this paper we show two contrasting results in this direction. First, we show that adaptive security is impossible for FHE satisfying the (standard) compactness requirement. On the other hand, we show a construction of adaptively secure FHE that is not compact, but that does achieve circuit privacy.
- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
- Book Title
- Public-Key Cryptography – PKC 2013
- Book Subtitle
- 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings
- pp 14-31
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- International Association for Cryptologic Research
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 16. Department of Computer and Information Sciences, Ibaraki University
- 17. Research Institute for Secure Systems (RISEC), National Institute of Advanced Industrial Science and Technology (AIST)
- Author Affiliations
- 18. Department of Computer Science, University of Maryland, USA
To view the rest of this content please follow the download PDF link above.