RCCA
Replayable Chosen Ciphertext Attack
Introduced In
- Relaxing Chosen-Ciphertext Security
Ran Canetti, Hugo Krawczyk, Jesper B. Nielsen (2003)
Relations
Implied By
Implies
Overview
Replayable Chosen Ciphertext Attack (RCCA) security, also known as IND-RCCA, is a strict relaxation of the CCA2 game. Intuitively, while the CCA2 decryption oracle refuses only the challenge ciphertext, the RCCA decryption oracle refuses all ciphertexts that decrypt to one of the plaintext values submitted in the challenge request. In particular, this decryption oracle refuses to decrypt all rerandomizations of the challenge ciphertext in the context of correct schemes.
In the FHE context, RCCA is incompatible with homomorphic evaluation. Indeed, given a challenge ciphertext
Formal Definition
The IND-RCCA security game proceeds as follows:
- The challenger generates a key pair
and gives to . - Phase 1 (pre-challenge):
has access to a decryption oracle and may submit arbitrary ciphertexts for decryption. outputs two equal-length messages . - The challenger samples
, computes , and sends to . - Phase 2 (post-challenge):
retains access to the decryption oracle, but when called on ciphertext , it refuses to answer the request if . outputs a guess .
The advantage is defined as:
The scheme is IND-RCCA secure if this advantage is negligible for all PPT adversaries.
Attacks & Relevance
RCCA security prevents an adversary from re-randomizing or re-encrypting a challenge ciphertext to circumvent the CCA2 restriction. While the CCA2 oracle only refuses the exact challenge ciphertext
RCCA was introduced by Canetti, Krawczyk, and Nielsen as a notion that is strong enough for most practical applications of CCA2 security (key transport, hybrid encryption) while being more permissive toward benign ciphertext transformations such as re-randomization. It is considered by many to be the “right” security notion for encryption in practice.
For FHE, RCCA is incompatible with homomorphic evaluation: given
Achieving This Notion
RCCA security is achieved by any CCA2-secure scheme (the implication CCA2
For FHE, RCCA is not achievable - the same fundamental incompatibility as CCA2 applies, since the adversary can use homomorphic evaluation to produce ciphertexts with discriminating plaintexts that are not in
Further Reading
The RCCA notion was introduced by Canetti, Krawczyk, and Nielsen (CRYPTO 2003). It sits strictly between CCA2 and vCCAD in the hierarchy of security notions. For a comparison with FHE-specific notions, see Brzuska et al. (CIC 2025).