Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption

Provided by: International Association for Cryptologic Research
Topic: Security
Format: PDF
In homomorphic encryption schemes, anyone can perform homomorphic operations, and therefore, it is difficult to manage when, where and by whom they are performed. In addition, the property that anyone can \"Freely\" perform the operation inevitably means that cipher-texts are malleable, and it is well-known that Adaptive Chosen Ciphertext (CCA) security and the homomorphic property can never be achieved simultaneously. In this paper, the authors show that CCA security and the homomorphic property can be simultaneously handled in situations that the user(s) who can perform homomorphic operations on encrypted data should be controlled/limited, and propose a new concept of homomorphic public-key encryption, which they call Keyed-Homomorphic Public-Key Encryption (KH-PKE).

Find By Topic