Acknowledgement
This work is supported by internal funds in Naval Academy, Republic of Korea.
References
- M. Bellare, O. Goldreich, A. Mityagin, The power of verification queries in message authentication and authenticated encryption, Crypt. ePrint Arch., Rep. 2004/309, (2004).
- M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, J. Crypt., (2008), 469-491.
- Z. Brakerski, V. Vaikuntanathan, Efficient fully homomorphic encryption from (standard) LWE, Found. Comp. Sci. - FOCS 2011, (2011), 97-106.
- D. Catalano, D Fiore, Practical homomorphic MACs for arithmetic circuits, Adv. Crypt. - EUROCRYPT 2013, 7881, (2013), 336-352.
- J. Cheon, K. Han, S. Hong, H. Kim, J. Kim, Y. Song, Toward a secure drone system: Flying with real-time homomorphic authenticated encryption, IEEE acc., 6, (2018), 24325-24339. https://doi.org/10.1109/ACCESS.2018.2819189
- J. Coron, T. Lepoint, M. Tibouchi, Scale-invariant fully homomorphic encryption over the integers, Pub. Crypt. - PKC 2014, 8383, (2014), 311-328.
- C. Gentry, Fully homomorphic encryption using ideal lattices, Proc. of the 41st ann. ACM symp. on The. comp. - STOC 2009, (2009), 169-178.
- C. Joo, A. Yun, Homomorphic authenticated encryption secure against chosen-ciphertext attack, Int. Conf. The. and App. Crypt. and Inf. Sec., (2014), 173-192.
- C. Joo, A. Yun, A strongly unforgeable homomorphic mac over integers, J. Kor. Ins. Inf. Sec. and Crypt., (2014), 461-475.
- J. Kim, Analysis of Homomorphic Authenticated Encryption, Conv. sec. j., 21(1), (2021), 33-44. https://doi.org/10.33778/kcsa.2021.21.1.033
- P. Struck, L. Schabhuser, D. Demirel, J. Buchmann, Linearly homomorphic authenticated encryption with provable correctness and public verifiability, Int. Conf. Cod. Crypt. and Inf. Sec., (2017), 142-160.