Verifiable Fully Homomorphic Encryption

01/17/2023
by   Alexander Viand, et al.
0

Fully Homomorphic Encryption (FHE) is seeing increasing real-world deployment to protect data in use by allowing computation over encrypted data. However, the same malleability that enables homomorphic computations also raises integrity issues, which have so far been mostly overlooked. While FHEs lack of integrity has obvious implications for correctness, it also has severe implications for confidentiality: a malicious server can leverage the lack of integrity to carry out interactive key-recovery attacks. As a result, virtually all FHE schemes and applications assume an honest-but-curious server who does not deviate from the protocol. In practice, however, this assumption is insufficient for a wide range of deployment scenarios. While there has been work that aims to address this gap, these have remained isolated efforts considering only aspects of the overall problem and fail to fully address the needs and characteristics of modern FHE schemes and applications. In this paper, we analyze existing FHE integrity approaches, present attacks that exploit gaps in prior work, and propose a new notion for maliciously-secure verifiable FHE. We then instantiate this new notion with a range of techniques, analyzing them and evaluating their performance in a range of different settings. We highlight their potential but also show where future work on tailored integrity solutions for FHE is still required.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/15/2023

vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash

Fully homomorphic encryption (FHE) is a powerful encryption technique th...
research
12/14/2017

Secure Encrypted Virtualization is Unsecure

Virtualization has become more important since cloud computing is gettin...
research
05/30/2019

DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions

In this paper, we address an unsolved problem in the real world: how to ...
research
09/20/2019

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution

Searchable symmetric encryption (SSE) allows the data owner to outsource...
research
02/18/2020

Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution

Attribute-based Encryption (ABE) is an information centric security solu...
research
02/19/2021

Toward Taming the Overhead Monster for Data-Flow Integrity

Data-Flow Integrity (DFI) is a well-known approach to effectively detect...
research
01/07/2021

Controlling Entity Integrity with Key Sets

Codd's rule of entity integrity stipulates that every table has a primar...

Please sign up or login with your details

Forgot password? Click here to reset