Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

被引:15
|
作者
Brakerski, Zvika [1 ]
Komargodski, Ilan [1 ]
Segev, Gil [2 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
[2] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, IL-91904 Jerusalem, Israel
基金
以色列科学基金会; 欧洲研究理事会;
关键词
Functional encryption; Private-key; Multi-input functional encryption; Adaptive security;
D O I
10.1007/s00145-017-9261-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct a general-purpose multi-input functional encryption scheme in the private-key setting. Namely, we construct a scheme where a functional key corresponding to a function f enables a user holding encryptions of to compute but nothing else. This is achieved starting from any general-purpose private-key single-input scheme (without any additional assumptions) and is proven to be adaptively secure for any constant number of inputs t. Moreover, it can be extended to a super-constant number of inputs assuming that the underlying single-input scheme is sub-exponentially secure. Instantiating our construction with existing single-input schemes, we obtain multi-input schemes that are based on a variety of assumptions (such as indistinguishability obfuscation, multilinear maps, learning with errors, and even one-way functions), offering various trade-offs between security assumptions and functionality. Previous and concurrent constructions of multi-input functional encryption schemes either rely on stronger assumptions and provided weaker security guarantees (Goldwasser et al. in Advances in cryptology-EUROCRYPT, 2014; Ananth and Jain in Advances in cryptology-CRYPTO, 2015), or relied on multilinear maps and could be proven secure only in an idealized generic model (Boneh et al. in Advances in cryptology-EUROCRYPT, 2015). In comparison, we present a general transformation that simultaneously relies on weaker assumptions and guarantees stronger security.
引用
收藏
页码:434 / 520
页数:87
相关论文
共 50 条
  • [1] Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
    Brakerski, Zvika
    Komargodski, Ilan
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 852 - 880
  • [2] Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
    Zvika Brakerski
    Ilan Komargodski
    Gil Segev
    Journal of Cryptology, 2018, 31 : 434 - 520
  • [3] Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
    Ilan Komargodski
    Gil Segev
    Eylon Yogev
    Journal of Cryptology, 2018, 31 : 60 - 100
  • [4] Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
    Komargodski, Ilan
    Segev, Gil
    Yogev, Eylon
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 352 - 377
  • [5] Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
    Komargodski, Ilan
    Segev, Gil
    Yogev, Eylon
    JOURNAL OF CRYPTOLOGY, 2018, 31 (01) : 60 - 100
  • [6] Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
    Komargodski, Ilan
    Segev, Gil
    Yogev, Eylon
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9015 : 352 - 377
  • [7] Function-Private Functional Encryption in the Private-Key Setting
    Zvika Brakerski
    Gil Segev
    Journal of Cryptology, 2018, 31 : 202 - 225
  • [8] Function-Private Functional Encryption in the Private-Key Setting
    Brakerski, Zvika
    Segev, Gil
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 306 - 324
  • [9] Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality
    Agrawal, Shweta
    Goyal, Rishab
    Tomida, Junichi
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 711 - 740
  • [10] Function-private functional encryption in the private-key setting
    Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot
    76100, Israel
    不详
    91904, Israel
    Lect. Notes Comput. Sci., (306-324):