vCCAD
Verifiable Chosen Ciphertext Attack with Decryption
Introduced In
- Relations among new CCA security notions for approximate FHE
Chris Brzuska, Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, Renaud Sirdey (2025)
Relations
Implied By
Implies
Overview
Verifiable Chosen Ciphertext Attack with Decryption (vCCAD) security, introduced by Brzuska, Canard, Fontaine, Phan, Pointcheval, Renard, and Sirdey, is a strengthening of vCCA security designed to cover the full spectrum of FHE schemes, including approximate ones. While vCCA was defined and studied by Manulis and Nguyen only under the correctness assumption, vCCAD adapts the approach to the general regime by incorporating the CPAD-style decryption oracle semantics into the vCCA framework.
The key insight is that vCCA’s post-challenge decryption oracle filters ciphertexts based on whether the challenge ciphertext appears among their extracted inputs (a syntactic check). vCCAD instead uses a semantic check: it filters ciphertexts based on whether the left and right plaintext evaluations (corresponding to the two challenge messages) differ. A ciphertext derived from the challenge is accepted by the vCCAD oracle if the homomorphic function evaluated on it produces the same result regardless of which challenge message was encrypted - meaning the decryption result cannot help the adversary distinguish.
This semantic filtering is strictly more permissive than vCCA’s syntactic filtering (every ciphertext accepted by vCCA is also accepted by vCCAD, but not vice versa), making vCCAD a seemingly weaker game. Yet because vCCAD also inherits CPAD-style tracking of left and right messages across all oracle queries, it captures both the malleability attacks that vCCA prevents and the noise-leakage attacks that CPAD prevents.
Brzuska et al. proved that vCCAD is the strongest CCA security notion known to be achievable by FHE in the general regime, with strict implications
Formal Definition
The vCCAD game is a multi-challenge game maintaining the same state
Decryption request. On query
- Compute
. - If
, return . - Otherwise, return
.
Where
In the public-key setting, an additional extractor
In the public-key setting, the vCCAD adversary can encrypt with chosen randomness on its own and submit the resulting ciphertexts for decryption via
Encryption, challenge, and evaluation requests follow the same structure as the CPAD game. The scheme is vCCAD-secure if the adversary’s advantage is negligible for all PPT adversaries.
Attacks & Relevance
Like vCCA, vCCAD prevents malleability-based attacks where an adversary homomorphically transforms the challenge ciphertext and submits the result for decryption. Like CPAD, it also prevents noise-leakage attacks where the adversary exploits decryptions of legitimately derived ciphertexts to recover secret key material from approximate decryption errors.
The separation results established by Brzuska et al. show that neither vCCA nor CPAD alone is sufficient in the approximate FHE setting.
vCCA does not imply
Achieving This Notion
Brzuska et al. showed that several of the construction blueprints from Manulis and Nguyen can be adapted to achieve vCCAD security, provided the underlying FHE is CPAD-secure (or sCPAD-secure in the public-key case) rather than merely CPA-secure. The Encrypt-then-Sign blueprint (private key) achieves vCCAD from a CPAD-secure FHE, a SUF-CMA signature scheme, and a straightline-extractable SNARK. The lighter Encrypt-then-MAC variant can be upgraded in the same way in the private-key setting, with the same compactness and input-privacy tradeoff as in the original vCCA construction. The CCA2-Companion-Ciphertext blueprint (public key, designated verifier) achieves vCCAD from an sCPAD-secure FHE, a CCA2-secure companion scheme, and a straightline-extractable SNARK.
For the public-key, public-verifier setting, the Naor-Yung-based blueprint from Manulis and Nguyen cannot be used when perfect correctness does not hold. Brzuska et al. therefore proposed a new Encrypt-then-Prove blueprint that replaces the signature with a publicly verifiable zk-SNARK for the well-formedness language, achieving vCCAD security from an sCPAD-secure FHE under simulation-extractability of the well-formedness SNARK and straightline-extractability of the evaluation SNARK.
Further Reading
The vCCAD notion was introduced in Brzuska et al. (CIC 2025).
For the underlying vCCA framework, see Manulis and Nguyen (Eurocrypt 2024).
The Strong CPAD notion required by the public-key constructions was introduced by Bernard, Joye, Smart, and Walter (Eurocrypt 2025).
For practical instantiation prospects, Ganesh, Nitulescu, and Soria-Vazquez (Journal of Cryptology 2023) provide SNARKs for ring arithmetic that could serve as the proof component.
The paper also discusses connections to the application-aware security paradigm of Alexandru, Al Badawi, Micciancio, and Polyakov (CIC 2026), suggesting future work on relativized variants