Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

被引:15
|
作者
Brakerski, Zvika [1 ]
Komargodski, Ilan [1 ]
Segev, Gil [2 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
[2] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, IL-91904 Jerusalem, Israel
基金
以色列科学基金会; 欧洲研究理事会;
关键词
Functional encryption; Private-key; Multi-input functional encryption; Adaptive security;
D O I
10.1007/s00145-017-9261-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct a general-purpose multi-input functional encryption scheme in the private-key setting. Namely, we construct a scheme where a functional key corresponding to a function f enables a user holding encryptions of to compute but nothing else. This is achieved starting from any general-purpose private-key single-input scheme (without any additional assumptions) and is proven to be adaptively secure for any constant number of inputs t. Moreover, it can be extended to a super-constant number of inputs assuming that the underlying single-input scheme is sub-exponentially secure. Instantiating our construction with existing single-input schemes, we obtain multi-input schemes that are based on a variety of assumptions (such as indistinguishability obfuscation, multilinear maps, learning with errors, and even one-way functions), offering various trade-offs between security assumptions and functionality. Previous and concurrent constructions of multi-input functional encryption schemes either rely on stronger assumptions and provided weaker security guarantees (Goldwasser et al. in Advances in cryptology-EUROCRYPT, 2014; Ananth and Jain in Advances in cryptology-CRYPTO, 2015), or relied on multilinear maps and could be proven secure only in an idealized generic model (Boneh et al. in Advances in cryptology-EUROCRYPT, 2015). In comparison, we present a general transformation that simultaneously relies on weaker assumptions and guarantees stronger security.
引用
收藏
页码:434 / 520
页数:87
相关论文
共 50 条
  • [21] Multi-input Quadratic Functional Encryption from Pairings
    Agrawal, Shweta
    Goyal, Rishab
    Tomida, Junichi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 208 - 238
  • [22] Homomorphic Encryption: From Private-Key to Public-Key
    Rothblum, Ron
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 219 - 234
  • [23] Multi-Input Functional Encryption with Controlled Decryption
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Hirano, Takato
    Kawai, Yutaka
    Koseki, Yoshihiro
    Schuldt, Jacob C. N.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (07) : 968 - 978
  • [24] Multi-key and Multi-input Predicate Encryption from Learning with Errors
    Francati, Danilo
    Friolo, Daniele
    Malavolta, Giulio
    Venturi, Daniele
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 573 - 604
  • [25] Multi-Input Functional Encryption: Efficient Applications from Symmetric Primitives
    Bakas, Alexandros
    Michalas, Antonis
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1106 - 1113
  • [26] Multi-input Inner-Product Functional Encryption from Pairings
    Abdalla, Michel
    Gay, Romain
    Raykova, Mariana
    Wee, Hoeteck
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 : 601 - 626
  • [27] Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors
    Francati, Danilo
    Friolo, Daniele
    Malavolta, Giulio
    Venturi, Daniele
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [28] Multi-input Functional Encryption for Unbounded Arity Functions
    Badrinarayanan, Saikrishna
    Gupta, Divya
    Jain, Abhishek
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 27 - 51
  • [29] Multi-Input Functional Encryption based Electronic Voting Scheme
    Yang, Chen
    You, Lin
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 134 - 138
  • [30] Registration-Based Encryption: Removing Private-Key Generator from IBE
    Garg, Sanjam
    Hajiabadi, Mohammad
    Mahmoody, Mohammad
    Rahimi, Ahmadreza
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 689 - 718