2016
DOI: 10.1016/j.tcs.2016.06.014
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Gong et al.'s CCA2-secure homomorphic encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…On top of this, almost all of the existing FHE schemes are only proved to be secure under the CCA-1 model, and whether FHE can further achieve CCA-2 is still questionable. In 2016, Gong et al [142] attempted to construct a CCA-2 secure additive homomorphic encryption scheme, which was broken by Lee et al [143] recently. Therefore, how to achieve a CCA-2 secure FHE scheme is still an open question to be solved.…”
Section: Work With Access Control Mechanismmentioning
confidence: 99%
“…On top of this, almost all of the existing FHE schemes are only proved to be secure under the CCA-1 model, and whether FHE can further achieve CCA-2 is still questionable. In 2016, Gong et al [142] attempted to construct a CCA-2 secure additive homomorphic encryption scheme, which was broken by Lee et al [143] recently. Therefore, how to achieve a CCA-2 secure FHE scheme is still an open question to be solved.…”
Section: Work With Access Control Mechanismmentioning
confidence: 99%