CCA1 secure FHE from PIO, revisited
Abstract Fully data using only public information. So far, most FHE schemes are CPA secure. In PKC 2017, Canetti et al. extended the generic transformation of Boneh, Canetti, Halevi and Katz to turn any multi-key identity-based FHE scheme into a CCA1-secure FHE scheme. Their main construction of mul...
Main Authors: | Biao Wang, Xueqing Wang, Rui Xue |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2018-09-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s42400-018-0013-8 |
Similar Items
-
Two-Party Privacy-Preserving Set Intersection with FHE
by: Yunlu Cai, et al.
Published: (2020-11-01) -
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes
by: Tongchen Shen, et al.
Published: (2019-01-01) -
Secure Fully Homomorphic Authenticated Encryption
by: Jeongsu Kim, et al.
Published: (2021-01-01) -
Towards practical fully homomorphic encryption
by: Alperin-Sheriff, Jacob
Published: (2015) -
Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards
by: Jung Hee Cheon, et al.
Published: (2018-01-01)