Composing Bridges

05/25/2023
by   Mugurel Barcau, et al.
0

The present work builds on previous investigations of the authors (and their collaborators) regarding bridges, a certain type of morphisms between encryption schemes, making a step forward in developing a (category theory) language for studying relations between encryption schemes. Here we analyse the conditions under which bridges can be performed sequentially, formalizing the notion of composability. One of our results gives a sufficient condition for a pair of bridges to be composable. We illustrate that composing two bridges, each independently satisfying a previously established IND-CPA security definition, can actually lead to an insecure bridge. Our main result gives a sufficient condition that a pair of secure composable bridges should satisfy in order for their composition to be a secure bridge. We also introduce the concept of a complete bridge and show that it is connected to the notion of Fully composable Homomorphic Encryption (FcHE), recently considered by Micciancio. Moreover, we show that a result of Micciancio which gives a construction of FcHE schemes can be phrased in the language of complete bridges, where his insights can be formalised in a greater generality.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/22/2023

Public Key Encryption with Secure Key Leasing

We introduce the notion of public key encryption with secure key leasing...
research
06/22/2019

Comparative study of Joint Image Encryption and Compression Schemes: A Review

With the development of imaging methods in wireless communications, enha...
research
07/14/2022

On the Feasibility of Unclonable Encryption, and More

Unclonable encryption, first introduced by Broadbent and Lord (TQC'20), ...
research
03/01/2020

Make Quantum Indistinguishability Great Again

In this work we study the (superposition-based, or QS2) quantum security...
research
07/13/2020

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

Puncturable encryption (PE), proposed by Green and Miers at IEEE S P 2...
research
03/24/2016

Secure cloud computations: Description of (fully)homomorphic ciphers within the P-adic model of encryption

In this paper we consider the description of homomorphic and fully homom...

Please sign up or login with your details

Forgot password? Click here to reset