Multi-key and Multi-input Predicate Encryption from Learning with Errors

被引:8
|
作者
Francati, Danilo [1 ]
Friolo, Daniele [2 ]
Malavolta, Giulio [3 ]
Venturi, Daniele [2 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] Sapienza Univ Rome, Rome, Italy
[3] Max Planck Inst Secur & Privacy, Bochum, Germany
关键词
predicate encryption; non-interactive MPC; matchmaking encryption; LWE; FUNCTIONAL ENCRYPTION;
D O I
10.1007/978-3-031-30620-4_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We put forward two natural generalizations of predicate encryption (PE), dubbed multi-key and multi-input PE. More in details, our contributions are threefold. Definitions. We formalize security of multi-key PE and multi-input PE following the standard indistinguishability paradigm, and modeling security both against malicious senders (i.e., corruption of encryption keys) and malicious receivers (i.e., collusions). - Constructions. We construct adaptively secure multi-key and multi-input PE supporting the conjunction of poly-many arbitrary single-input predicates, assuming the sub-exponential hardness of the learning with errors (LWE) problem. - Applications. We show that multi-key and multi-input PE for expressive enough predicates suffices for interesting cryptographic applications, including non-interactive multi-party computation (NIMPC) and matchmaking encryption (ME). In particular, plugging in our constructions of multi-key and multi-input PE, under the sub-exponential LWE assumption, we obtain the first ME supporting arbitrary policies with unbounded collusions, as well as robust (resp. non-robust) NI-MPC for so-called all-or-nothing functions satisfying a non-trivial notion of reusability and supporting a constant (resp. polynomial) number of parties. Prior to our work, both of these applications required much heavier tools such as indistinguishability obfuscation or compact functional encryption.
引用
收藏
页码:573 / 604
页数:32
相关论文
共 50 条
  • [41] Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error
    Koo, Zahyun
    Lee, Joon-Woo
    No, Jong-Seon
    Kim, Young-Sik
    IEEE ACCESS, 2023, 11 : 50310 - 50324
  • [42] Privacy preserving via multi-key homomorphic encryption in cloud computing
    Li, Xuelian
    Li, Hui
    Gao, Juntao
    Wang, Runsong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [43] Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model
    Xu, Wenju
    Wang, Baocang
    Qu, Quanbo
    Zhou, Tanping
    Duan, Pu
    COMPUTER JOURNAL, 2023, 66 (10): : 2355 - 2364
  • [44] Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping
    Xu, Kexin
    Tan, Benjamin Hong Meng
    Wang, Li-Ping
    Aung, Khin Mi Mi
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2023, 968
  • [45] Multi-input Functional Encryption with Unbounded-Message Security
    Goyal, Vipul
    Jain, Aayush
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 531 - 556
  • [46] Multi-Input Functional Encryption based Electronic Voting Scheme
    Yang, Chen
    You, Lin
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 134 - 138
  • [47] Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model
    Li, Hui
    Li, Xuelian
    Gao, Juntao
    Wang, Runsong
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 342 - 357
  • [48] Secure and efficient multi-key aggregation for federated learning
    Li, Yanling
    Lai, Junzuo
    Zhang, Rong
    Sun, Meng
    INFORMATION SCIENCES, 2024, 654
  • [49] Multi-key FHE from LWE, Revisited
    Peikert, Chris
    Shiehian, Sina
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 217 - 238
  • [50] Secure and Flexible Privacy-Preserving Federated Learning Based on Multi-Key Fully Homomorphic Encryption
    Shen, Jiachen
    Zhao, Yekang
    Huang, Shitao
    Ren, Yongjun
    ELECTRONICS, 2024, 13 (22)