Analysis of Gong et al.'s CCA2-secure homomorphic encryption

It is a well-known result that homomorphic encryption is not secure against adaptive chosen ciphertext attacks (CCA2) because of its malleable property. Very recently, however, Gong et al. proposed a construction asserted to be a CCA2-secure additively homomorphic encryption (AHE) scheme; in their c...

Full description

Saved in:
Bibliographic Details
Main Authors: Lee, Hyung Tae, Ling, San, Wang, Huaxiong
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2017
Subjects:
Online Access:https://hdl.handle.net/10356/83728
http://hdl.handle.net/10220/42768
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-83728
record_format dspace
spelling sg-ntu-dr.10356-837282023-02-28T19:36:40Z Analysis of Gong et al.'s CCA2-secure homomorphic encryption Lee, Hyung Tae Ling, San Wang, Huaxiong School of Physical and Mathematical Sciences Additively Homomorphic Encryption Adaptive Chosen Ciphertext Attack It is a well-known result that homomorphic encryption is not secure against adaptive chosen ciphertext attacks (CCA2) because of its malleable property. Very recently, however, Gong et al. proposed a construction asserted to be a CCA2-secure additively homomorphic encryption (AHE) scheme; in their construction, the adversary is not able to obtain a correct answer when querying the decryption oracle on a ciphertext obtained by modifying the challenge ciphertext (Theoretical Computer Science, 2016). Because their construction is very similar to Paillier's AHE, it appeared to support an additively homomorphic property, though they did not specify an evaluation algorithm for the scheme in their paper. In this paper, we present a simple CCA2 attack on their construction by re-randomizing the challenge ciphertext. Furthermore, we look into an additively homomorphic property of their construction. To do this, we first consider a typical candidate for an addition algorithm on ciphertexts, as provided for previous AHE constructions, and establish that it does not function correctly. Subsequently, we provide plausible evidence for the hardness of achieving an additively homomorphic property with their construction. According to our analysis, it seems hard to preserve an additively homomorphic property of their construction without any modification. In addition, as a minor contribution, we point out a flaw in the decryption algorithm of their construction and present a rectified algorithm for correct decryption. MOE (Min. of Education, S’pore) Accepted version 2017-06-29T04:50:08Z 2019-12-06T15:30:47Z 2017-06-29T04:50:08Z 2019-12-06T15:30:47Z 2016 Journal Article Lee, H. T., Ling, S., & Wang, H. (2016). Analysis of Gong et al.'s CCA2-secure homomorphic encryption. Theoretical Computer Science, 640, 104-114. 0304-3975 https://hdl.handle.net/10356/83728 http://hdl.handle.net/10220/42768 10.1016/j.tcs.2016.06.014 en Theoretical Computer Science © 2016 Elsevier B.V. This is the author created version of a work that has been peer reviewed and accepted for publication by Theoretical Computer Science, Elsevier B.V. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1016/j.tcs.2016.06.014]. 14 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Additively Homomorphic Encryption
Adaptive Chosen Ciphertext Attack
spellingShingle Additively Homomorphic Encryption
Adaptive Chosen Ciphertext Attack
Lee, Hyung Tae
Ling, San
Wang, Huaxiong
Analysis of Gong et al.'s CCA2-secure homomorphic encryption
description It is a well-known result that homomorphic encryption is not secure against adaptive chosen ciphertext attacks (CCA2) because of its malleable property. Very recently, however, Gong et al. proposed a construction asserted to be a CCA2-secure additively homomorphic encryption (AHE) scheme; in their construction, the adversary is not able to obtain a correct answer when querying the decryption oracle on a ciphertext obtained by modifying the challenge ciphertext (Theoretical Computer Science, 2016). Because their construction is very similar to Paillier's AHE, it appeared to support an additively homomorphic property, though they did not specify an evaluation algorithm for the scheme in their paper. In this paper, we present a simple CCA2 attack on their construction by re-randomizing the challenge ciphertext. Furthermore, we look into an additively homomorphic property of their construction. To do this, we first consider a typical candidate for an addition algorithm on ciphertexts, as provided for previous AHE constructions, and establish that it does not function correctly. Subsequently, we provide plausible evidence for the hardness of achieving an additively homomorphic property with their construction. According to our analysis, it seems hard to preserve an additively homomorphic property of their construction without any modification. In addition, as a minor contribution, we point out a flaw in the decryption algorithm of their construction and present a rectified algorithm for correct decryption.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Lee, Hyung Tae
Ling, San
Wang, Huaxiong
format Article
author Lee, Hyung Tae
Ling, San
Wang, Huaxiong
author_sort Lee, Hyung Tae
title Analysis of Gong et al.'s CCA2-secure homomorphic encryption
title_short Analysis of Gong et al.'s CCA2-secure homomorphic encryption
title_full Analysis of Gong et al.'s CCA2-secure homomorphic encryption
title_fullStr Analysis of Gong et al.'s CCA2-secure homomorphic encryption
title_full_unstemmed Analysis of Gong et al.'s CCA2-secure homomorphic encryption
title_sort analysis of gong et al.'s cca2-secure homomorphic encryption
publishDate 2017
url https://hdl.handle.net/10356/83728
http://hdl.handle.net/10220/42768
_version_ 1759853766417317888