Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
Gong L., Li S., Mao Q., Wang D., Dou J. Theoretical Computer Science609, Part 1,  253-261,2016.Type:Article
Date Reviewed: Mar 16 2016

Securing electronic information is one of the hottest research topics today. Encryption is the building block for various information security requirements such as confidentiality, authentication, integrity, and availability. Homomorphic encryption is a special type through which users can perform operations on the encrypted text that are similar to performing the operations on plain text. Since large numbers of applications are on the cloud, this type of encryption is the need of the hour.

One of the major limitations of the homomorphic encryption techniques is vulnerability against an adaptive chosen ciphertext attack (CCA2). This paper addresses this important research issue in cryptography and suggests homomorphic encryption schemes that are robust against CCA2. The authors comprehensively present definitions, conditions, and motivations for schemes against CCA2 in the introduction section.

The authors have proposed an algorithm for blocking CCA2 using modular arithmetic. The algorithm and related concepts are clearly presented in this paper. In addition to this, the authors prove correctness of their scheme mathematically. Interestingly, the authors have devised algorithms for security proofs for both chosen plaintext attacks and CCA2.

Overall, this paper provides a theatrical algorithm with suitable mathematical support for homomorphic encryption robust against CCA2. This paper will be useful for researchers working in the field of cryptography.

Reviewer:  S. Ramakrishnan Review #: CR144239 (1606-0412)
Bookmark and Share
  Featured Reviewer  
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy