METHOD FOR CIPHERING A MESSAGE VIA A KEYED HOMOMORPHIC ENCRYPTION FUNCTION, CORRESPONDING ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT
First Claim
Patent Images
1. Method for ciphering a message by a sender device at destination to a receiver device, said method comprising using a keyed homomorphic encryption function associated with a public key of said receiver device, wherein it comprises:
- ciphering said message with an encryption scheme secure against adaptive chosen-ciphertext attacks, in function of a first element of said public key, delivering a ciphertext;
determining for said ciphertext, an homomorphic non-interactive proof and a simulation-sound non-interactive proof, said homomorphic non-interactive proof being obtained in function of a set of signatures comprised in said public key, and said simulation-sound non-interactive proof being obtained in function of a second element comprised in said public key, and an evaluation key of said keyed homomorphic encryption function being an element linked to said second element;
delivering a cipher of said message comprising said ciphertext, said homomorphic non-interactive proof and said simulation-sound non-interactive proof.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, it is proposed a method for ciphering a message by a sender device at destination to a receiver device, said method comprising using a keyed homomorphic encryption function associated with a public key of said receiver device. Such method is remarkable in that it comprises:
- ciphering said message with an encryption scheme secure against adaptive chosen-ciphertext attacks, in function of a first element of said public key, delivering a ciphertext;
- determining for said ciphertext, an homomorphic non-interactive proof and a simulation-sound non-interactive proof, said homomorphic non-interactive proof being obtained in function of a set of signatures comprised in said public key, and said simulation-sound non-interactive proof being obtained in function of a second element comprised in said public key, and an evaluation key of said keyed homomorphic encryption function being an element linked to said second element;
- delivering a cipher of said message comprising said ciphertext, said homomorphic non-interactive proof and said simulation-sound non-interactive proof.
-
Citations
16 Claims
-
1. Method for ciphering a message by a sender device at destination to a receiver device, said method comprising using a keyed homomorphic encryption function associated with a public key of said receiver device, wherein it comprises:
-
ciphering said message with an encryption scheme secure against adaptive chosen-ciphertext attacks, in function of a first element of said public key, delivering a ciphertext; determining for said ciphertext, an homomorphic non-interactive proof and a simulation-sound non-interactive proof, said homomorphic non-interactive proof being obtained in function of a set of signatures comprised in said public key, and said simulation-sound non-interactive proof being obtained in function of a second element comprised in said public key, and an evaluation key of said keyed homomorphic encryption function being an element linked to said second element; delivering a cipher of said message comprising said ciphertext, said homomorphic non-interactive proof and said simulation-sound non-interactive proof. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. Method for processing a cipher of a message, said method being executed by a receiver device, and said method being characterized in that it comprises:
-
obtaining a homomorphic non-interactive proof and a simulation-sound non-interactive proof that are associated to said cipher; verifying a validity of said homomorphic non-interactive proof and said simulation-sound non-interactive proof, delivering an information of validity of said cipher. - View Dependent Claims (11, 12)
-
-
13. A computer-readable and non-transient storage medium storing a computer program comprising a set of computer-executable instructions to implement a method for cryptographic computations when the instructions are executed by a computer, wherein the instructions comprise instructions, which when executed, configure the computer to perform a method for ciphering a message, said method comprising using a keyed homomorphic encryption function associated with a public key of a receiver device, wherein it comprises:
-
ciphering said message with an encryption scheme secure against adaptive chosen-ciphertext attacks, in function of a first element of said public key, delivering a ciphertext; determining for said ciphertext, an homomorphic non-interactive proof and a simulation-sound non-interactive proof, said homomorphic non-interactive proof being obtained in function of a set of signatures comprised in said public key, and said simulation-sound non-interactive proof being obtained in function of a second element comprised in said public key, and an evaluation key of said keyed homomorphic encryption function being an element linked to said second element; delivering a cipher of said message comprising said ciphertext, said homomorphic non-interactive proof and said simulation-sound non-interactive proof.
-
-
14. A computer-readable and non-transient storage medium storing a computer program comprising a set of computer-executable instructions to implement a method for cryptographic computations when the instructions are executed by a computer, wherein the instructions comprise instructions, which when executed, configure the computer to perform a method for processing a cipher of a message, wherein said method comprises:
-
obtaining a homomorphic non-interactive proof and a simulation-sound non-interactive proof that are associated to said cipher; verifying a validity of said homomorphic non-interactive proof and said simulation-sound non-interactive proof, delivering an information of validity of said cipher.
-
-
15. Electronic device comprising a ciphering module configured to cipher a message, said ciphering module comprising a module configured to use a keyed homomorphic encryption function associated with a public key of a receiver device, wherein said module configured to use comprises:
-
a module configured to cipher said message with an encryption scheme secure against adaptive chosen-ciphertext attacks, in function of a first element of said public key, delivering a ciphertext; a module configured to determine for said ciphertext, an homomorphic non-interactive proof and a simulation-sound non-interactive proof, said homomorphic non-interactive proof being obtained in function of a set of signatures comprised in said public key, and said simulation-sound non-interactive proof being obtained in function of a second element comprised in said public key, and an evaluation key of said keyed homomorphic encryption function being an element linked to said second element; a module configured to deliver a cipher of said message comprising said ciphertext, said homomorphic non-interactive proof and said simulation-sound non-interactive proof.
-
-
16. Electronic device comprising a module configured to process a cipher of a message, wherein said module comprises:
-
a module configured to obtain a homomorphic non-interactive proof and a simulation-sound non-interactive proof that are associated to said cipher; a module configured to verify a validity of said homomorphic non-interactive proof and said simulation-sound non-interactive proof, delivering an information of validity of said cipher.
-
Specification