DOI QR코드

DOI QR Code

ANALYSIS OF THE SECURITY OF GENERIC HOMOMORPHIC AUTHENTICATED ENCRYPTION

  • Jinsu Kim (Division of Science Republic of Korea Naval Academy )
  • Received : 2022.12.09
  • Accepted : 2023.01.26
  • Published : 2023.05.31

Abstract

Recently, a new type of encryption called Homomorphic Authenticated Encryption (HAE) has been proposed. This combines the functionality of homomorphic encryption with authentication. Several concrete HAE schemes have been developed and security results for homomorphic authenticated encryption, designed by combining a homomorphic message authentication scheme with a homomorphic secret-key encryption, have been partially reported. In this paper, we analyze the security of a design method that combines homomorphic message authentication and homomorphic encryption, with a focus on the encryption after authentication (EAA) type. The results of our analysis show that while non-forgeability and indistinguishability are maintained, strong non-forgeability is not.

Keywords

Acknowledgement

This work is supported by internal funds in Naval Academy, Republic of Korea.

References

  1. M. Bellare, O. Goldreich, A. Mityagin, The power of verification queries in message authentication and authenticated encryption, Crypt. ePrint Arch., Rep. 2004/309, (2004). 
  2. M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, J. Crypt., (2008), 469-491. 
  3. Z. Brakerski, V. Vaikuntanathan, Efficient fully homomorphic encryption from (standard) LWE, Found. Comp. Sci. - FOCS 2011, (2011), 97-106. 
  4. D. Catalano, D Fiore, Practical homomorphic MACs for arithmetic circuits, Adv. Crypt. - EUROCRYPT 2013, 7881, (2013), 336-352. 
  5. J. Cheon, K. Han, S. Hong, H. Kim, J. Kim, Y. Song, Toward a secure drone system: Flying with real-time homomorphic authenticated encryption, IEEE acc., 6, (2018), 24325-24339.  https://doi.org/10.1109/ACCESS.2018.2819189
  6. J. Coron, T. Lepoint, M. Tibouchi, Scale-invariant fully homomorphic encryption over the integers, Pub. Crypt. - PKC 2014, 8383, (2014), 311-328. 
  7. C. Gentry, Fully homomorphic encryption using ideal lattices, Proc. of the 41st ann. ACM symp. on The. comp. - STOC 2009, (2009), 169-178. 
  8. C. Joo, A. Yun, Homomorphic authenticated encryption secure against chosen-ciphertext attack, Int. Conf. The. and App. Crypt. and Inf. Sec., (2014), 173-192. 
  9. C. Joo, A. Yun, A strongly unforgeable homomorphic mac over integers, J. Kor. Ins. Inf. Sec. and Crypt., (2014), 461-475. 
  10. J. Kim, Analysis of Homomorphic Authenticated Encryption, Conv. sec. j., 21(1), (2021), 33-44.  https://doi.org/10.33778/kcsa.2021.21.1.033
  11. P. Struck, L. Schabhuser, D. Demirel, J. Buchmann, Linearly homomorphic authenticated encryption with provable correctness and public verifiability, Int. Conf. Cod. Crypt. and Inf. Sec., (2017), 142-160.