sCPAD
Strong Chosen Plaintext Attack with Decryption
Introduced In
- Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes
Olivier Bernard, Marc Joye, Nigel P. Smart, Michael Walter (2025)
Relations
Implied By
Implies
Overview
Strong Chosen Plaintext Attack with Decryption (sCPAD) security is a strengthening of CPAD security introduced to address a mismatch between the CPAD security model and practical public-key FHE deployments. In the CPAD game, fresh ciphertexts in the adversary’s state can only be produced by the encryption oracle, which samples its own randomness internally. However, in real-world public-key settings, an adversary possesses the public key and can encrypt messages using randomness of its choosing - it may only be required to prove that the resulting ciphertext is well-formed, not that the randomness was sampled honestly. The sCPAD game closes this gap by giving the adversary an additional encryption oracle that accepts adversarially chosen randomness.
The key insight is that even though a public-key adversary can always compute encryptions on its own, the ability to inject ciphertexts with chosen randomness into the game state - and then request their decryption after homomorphic operations - can leak information that the standard CPAD model does not capture. Bernard, Joye, Smart, and Walter proved that sCPAD is strictly stronger than CPAD: there exist schemes that are CPAD-secure but completely sCPAD-insecure, even in the public-key setting.
Formal Definition
The sCPAD security game extends the CPAD game by adding a second encryption oracle that takes adversarially chosen randomness.
Given a public-key FHE scheme
- Key generation. Run
and give to . - Challenge encryption request. On query
with , compute , return to , and set . - Randomness-controlled encryption request. On query
with and , compute , return to , and set . - Evaluation request. On query
with indices into , compute , , and . Return to and set . - Decryption request. On query
with an index into : if , return . Otherwise return . - Guessing stage.
outputs a guess . It wins if .
The scheme is sCPAD-secure if the advantage
Note that the randomness-controlled oracle
Separation from CPAD
The implication sCPAD
For symmetric-key schemes, the separation is straightforward: in Regev-type encryption, choosing the encryption randomness means the adversary knows the noise term and can remove it, yielding a linear equation in the secret key that is recoverable after
For public-key schemes, one might expect the two notions to coincide since the adversary already holds the public key and can encrypt on its own.
Bernard et al. showed this intuition is false by constructing an explicit counterexample.
Starting from any CPAD-secure public-key FHE scheme over
Achieving This Notion
Bernard et al. introduced a new correctness definition called ACER correctness (statistical correctness under Adversarially Chosen Encryption Randomness) tailored to the sCPAD setting. A scheme is ACER correct if fresh ciphertexts decrypt perfectly for all choices of randomness, and the failure probability after homomorphic evaluation is negligible even when input ciphertexts were produced with adversarially chosen randomness.
The central result is that IND-CPA security combined with ACER correctness implies sCPAD security. In contrast, IND-CPA security combined with ordinary statistical correctness suffices for CPAD but does not imply sCPAD.
Achieving ACER correctness is non-trivial. A naive approach of hashing the input randomness through a random oracle to force uniform encryption randomness does not work, because an adversary can use rejection sampling to bias the noise (e.g., selecting ciphertexts whose noise terms all share the same sign, amplifying the failure probability after addition).
The paper gives a sufficient condition: if a statistically correct scheme has re-randomizable ciphertexts and fresh ciphertexts are perfectly correct, then re-randomizing each input ciphertext before evaluation yields ACER correctness.
Concretely, the evaluation algorithm is modified to
For TFHE specifically, re-randomization can be performed by adding an encryption of zero (using the public key), and the paper shows that their new modulus-switching techniques - the probabilistic and exact drift defenses - enable TFHE parameter sets originally designed for IND-CPA security to achieve sCPAD security with negligible overhead.
Further Reading
The sCPAD notion was introduced by Bernard, Joye, Smart, and Walter (Eurocrypt 2025). The idea of supplying randomness to the encryption oracle appeared earlier in a proof technique by Brzuska et al. (CIC 2025), but the notion was not formally defined and its relationship to CPAD was not clarified. For the broader landscape of CPAD variants, Brzuska et al. (CIC 2025) established a hierarchy of single-challenge and multiple-challenge CPAD notions, and Alexandru, Al Badawi, Micciancio, and Polyakov (CIC 2026) introduced application-aware security as a weaker alternative relativized to specific function classes.