Introduced In
- Achievable CCA2 Relaxation for Homomorphic Encryption
Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald (2022)
Relations
Implied By
Implies
Overview
Functional CPA (funcCPA) security, introduced by Akavia, Gentry, Halevi, and Vald, extends the standard CPA game with a functional re-encryption oracle that models settings where a server performing FHE computations is allowed to interactively delegate part of the computation back to the client (who holds the secret key).
In the funcCPA game, the adversary can submit a ciphertext
The motivation comes from practical FHE deployments where bootstrapping - the most expensive operation - can be replaced by a cheaper interactive protocol: the server sends a masked ciphertext to the client (or a local trusted proxy such as a secure enclave), which decrypts and re-encrypts it, and the server removes the mask homomorphically. The funcCPA notion captures the security requirement in this setting: even with access to this re-encryption oracle, the adversary should not be able to break indistinguishability.
The key result is that funcCPA is strictly stronger than CPA. Intuitively, the re-encryption oracle is weaker than a full decryption oracle because it only returns encryptions of function outputs, never raw plaintexts. Akavia et al. provided construction blueprints to turn CPA-secure FHE schemes into funcCPA-secure ones.
Formal Definition
Given a public-key encryption scheme
- The challenger generates
and gives to . has access to a recryption oracle which, on input with and , returns . outputs two messages . - The challenger samples
, computes , and sends to . retains access to . outputs a guess .
The scheme is funcCPA-secure if the advantage
Attacks & Relevance
The canonical deployment scenario is an FHE server that outsources bootstrapping to the client or to a secure enclave. Even though the enclave only sees masked values, the funcCPA model captures the adversary’s ability to adaptively choose which ciphertexts get refreshed and through which functions.
Some CPA-secure schemes become insecure when the adversary gains re-encryption access.
Fontaine, Renard, Sirdey, and Stan (ePrint 2025/2036) further showed that funcCPA-style extensions of CCA1 and vCCA (denoted CCA1R, CCA1M, vCCAR, vCCAM) all collapse back to their base notions. This means that the gap between CPA and funcCPA does not propagate to stronger notions: once a scheme is CCA1 or vCCA secure, adding recryption or multiplication oracles does not weaken it.
Achieving This Notion
Akavia, Gentry, Halevi, and Vald provided blueprints for constructing funcCPA-secure schemes from CPA-secure FHE.
Any vCCA-secure scheme trivially achieves funcCPA.
For concrete constructions, the “two-ciphertexts” construction
Further Reading
The funcCPA notion was introduced by Akavia, Gentry, Halevi, and Vald (JoC 2025).
The equivalence between funcCPA and funcCPA