How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

We consider a setting of two-party computation between a server and a client where every message received by the server is encrypted by a fully homomorphic encryption (FHE) scheme and its decryption key is held by the client only. Akavia and Vald (IACR ePrint Archive, 2021) revisited the privacy problem in such protocols against malicious servers and revealed (as opposed to a naive expectation) that under certain condition, a malicious server can recover the client's input even if the underlying FHE scheme is IND-CPA secure. They also gave some sufficient conditions for the FHE scheme to ensure the privacy against malicious servers. However, their argument did not consider the possibility that a query from a malicious server to a client involves an invalid ciphertext. In this paper, we show, by giving a concrete example, that if such an invalid query is just rejected by the client, then the sufficient conditions in Akavia and Vald's result do not in general ensure the privacy against malicious servers. We also propose another option to handle an invalid query in a way that the client returns a random ciphertext (without explicitly rejecting the query), and show that such a protocol is private against malicious servers if the underlying FHE scheme is IND-CPA secure, sanitizable (in the sense of Ducas and Stehlé, EUROCRYPT 2016), and circular secure.

Original languageEnglish
Title of host publicationAPKC 2022 - Proceedings of the 9th ACM ASIA Public-Key Cryptography Workshop
PublisherAssociation for Computing Machinery, Inc
Pages15-25
Number of pages11
ISBN (Electronic)9781450391740
DOIs
Publication statusPublished - May 30 2022
Event9th ACM Asia Public-Key Cryptography Workshop, APKC 2022, in conjunction with the 17th ACM ASIA Conference on Computer and Communications Security, ASIACCS 2022 - Virtual, Online, Japan
Duration: May 30 2022 → …

Publication series

NameAPKC 2022 - Proceedings of the 9th ACM ASIA Public-Key Cryptography Workshop

Conference

Conference9th ACM Asia Public-Key Cryptography Workshop, APKC 2022, in conjunction with the 17th ACM ASIA Conference on Computer and Communications Security, ASIACCS 2022
Country/TerritoryJapan
CityVirtual, Online
Period5/30/22 → …

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption'. Together they form a unique fingerprint.

Cite this