vCCA
Verifiable Chosen Ciphertext Attack
Introduced In
- Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability
Mark Manulis, Jérôme Nguyen (2024)
Relations
Implied By
Implies
Overview
Verifiable Chosen Ciphertext Attack (vCCA) security, introduced by Manulis and Nguyen, is a relaxation of CCA2 security designed to be compatible with the malleable nature of FHE. The core idea is to augment the FHE scheme with machinery that proves the well-formedness of ciphertexts - both fresh ciphertexts (direct outputs of encryption) and evaluated ciphertexts (derived through genuine homomorphic operations). The decryption function rejects any ciphertext that fails verification.
The motivation arises from the fundamental tension between CCA2 security and homomorphic evaluation: CCA2 prevents any meaningful ciphertext transformation, which is exactly what FHE enables. Meanwhile, CCA1 does not provide post-challenge decryption access. vCCA occupies a middle ground: it grants the adversary a post-challenge decryption oracle (like CCA2), but this oracle rejects any ciphertext that is a byproduct of the challenge ciphertext - identified by means of a witness extractor derived from an underlying SNARK. This filters out exactly the queries that would allow trivial wins via homomorphic manipulation of the challenge, while still permitting decryption of unrelated ciphertexts.
Manulis and Nguyen proved that vCCA is strictly stronger than CCA1 and strictly weaker than CCA2. Importantly, the single-challenge and multi-challenge variants of vCCA are equivalent, as the standard hybrid argument applies: the extractor-based filtering prevents an adversary from detecting the transition point in a hybrid game.
Formal Definition
The vCCA security game assumes the encryption scheme is augmented with a PPT witness extractor
The game proceeds as a standard CCA2 game with two decryption phases:
- Phase 1 (pre-challenge). On query
: return . - The adversary issues the challenge query and receives
. - Phase 2 (post-challenge). On query
: compute . If , return . Otherwise return .
The multi-challenge (LOR) variant replaces the single challenge ciphertext check with
The scheme is vCCA-secure if the adversary’s advantage is negligible for all PPT adversaries.
Attacks & Relevance
In an FHE deployment, a decryption oracle naturally arises whenever the secret key holder decrypts results - if an adversary can influence what gets decrypted, it can submit homomorphically modified challenge ciphertexts (e.g.,
However, vCCA was originally defined and studied under the correctness assumption.
In the correct regime (negligible decryption errors), vCCA and vCCAD are equivalent [BCF+25, Prop. 5.6]. In the general regime (approximate FHE), vCCAD is strictly stronger [BCF+25, Prop. 5.7].
In the general regime where approximate FHE schemes are allowed, vCCA does not imply CPAD security - it only implies the weaker
Achieving This Notion
Manulis and Nguyen proposed several construction blueprints for achieving vCCA from a CPA-secure and correct FHE scheme.
The general strategy is to augment the scheme with proof machinery: fresh ciphertexts are made verifiable (via signatures in the private-key setting, or Naor-Yung double encryption in the public-key setting), and evaluated ciphertexts carry SNARK proofs of correct homomorphic derivation from well-formed inputs.
The decryption function returns
Specific blueprints include Encrypt-then-Sign (private key, using SUF-CMA signatures), Encrypt-then-MAC (private key, using a MAC), CCA2-Companion-Ciphertext (public key, designated verifier, pairing an FHE ciphertext with a CCA2-encrypted copy of the message and randomness), and a Naor-Yung-based construction (public key, public verifier). A fifth blueprint, Encrypt-then-Prove [Brzuska et al., CIC 2025], replaces the signature with a publicly verifiable zk-SNARK for the well-formedness language, achieving the first compact, publicly verifiable vCCAD (and hence vCCA) construction in the public-key setting. All require a SNARK for the language of correct homomorphic evaluations.
Further Reading
The vCCA notion was introduced in Manulis and Nguyen (Eurocrypt 2024).
Brzuska et al. (CIC 2025) clarified the relationship between vCCA and CPAD: