It is a well-known result that homomorphic encryption is not secure against adaptive chosen ciphertext attacks (CCA2) because of its malleable property. Very recently, however, Gong et al. proposed a construction asserted to be a CCA2-secure additively homomorphic encryption (AHE) scheme; in their construction, the adversary is not able to obtain a correct answer when querying the decryption oracle on a ciphertext obtained by modifying the challenge ciphertext (Theoretical Computer Science, 2016). Because their construction is very similar to Paillier's AHE, it appeared to support an additively homomorphic property, though they did not specify an evaluation algorithm for the scheme in their paper. In this paper, we present a simple CCA2 att...
Cryptographic primitives based on innite families of progressively weaker assump-tions have been pro...
Abstract. We study homomorphic authenticated encryption, where privacy and authenticity of data are ...
Title: Homomorphic encryption schemes Author: Anežka Titěrová Department: Department of Algebra Supe...
It is a well-known result that homomorphic encryption is not secure against adaptive chosen cipherte...
In this paper we present adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption...
Abstract. In CCS’14, Cheon et al. proposed a new additive homomorphic encryption scheme which is cla...
Abstract. Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryp...
Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryption has b...
We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PK...
The notion of fully homomorphic encryption is very important since it enables many important applica...
peer reviewedIn his seminal paper at STOC 2009, Gentry left it as a future work to investigate (some...
Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arb...
Abstract. Chosen-Ciphertext (IND-CCA) security is generally consid-ered the right notion of security...
Abstract. In his seminal paper at STOC 2009, Gentry left it as a future work to investigate (somewha...
In his seminal paper at STOC 2009, Gentry left it as a future work to investigate (somewhat) homomor...
Cryptographic primitives based on innite families of progressively weaker assump-tions have been pro...
Abstract. We study homomorphic authenticated encryption, where privacy and authenticity of data are ...
Title: Homomorphic encryption schemes Author: Anežka Titěrová Department: Department of Algebra Supe...
It is a well-known result that homomorphic encryption is not secure against adaptive chosen cipherte...
In this paper we present adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption...
Abstract. In CCS’14, Cheon et al. proposed a new additive homomorphic encryption scheme which is cla...
Abstract. Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryp...
Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryption has b...
We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PK...
The notion of fully homomorphic encryption is very important since it enables many important applica...
peer reviewedIn his seminal paper at STOC 2009, Gentry left it as a future work to investigate (some...
Fully homomorphic encryption (FHE) is a powerful tool in cryptography that allows one to perform arb...
Abstract. Chosen-Ciphertext (IND-CCA) security is generally consid-ered the right notion of security...
Abstract. In his seminal paper at STOC 2009, Gentry left it as a future work to investigate (somewha...
In his seminal paper at STOC 2009, Gentry left it as a future work to investigate (somewhat) homomor...
Cryptographic primitives based on innite families of progressively weaker assump-tions have been pro...
Abstract. We study homomorphic authenticated encryption, where privacy and authenticity of data are ...
Title: Homomorphic encryption schemes Author: Anežka Titěrová Department: Department of Algebra Supe...