Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

被引:15
|
作者
Brakerski, Zvika [1 ]
Komargodski, Ilan [1 ]
Segev, Gil [2 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
[2] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, IL-91904 Jerusalem, Israel
基金
以色列科学基金会; 欧洲研究理事会;
关键词
Functional encryption; Private-key; Multi-input functional encryption; Adaptive security;
D O I
10.1007/s00145-017-9261-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct a general-purpose multi-input functional encryption scheme in the private-key setting. Namely, we construct a scheme where a functional key corresponding to a function f enables a user holding encryptions of to compute but nothing else. This is achieved starting from any general-purpose private-key single-input scheme (without any additional assumptions) and is proven to be adaptively secure for any constant number of inputs t. Moreover, it can be extended to a super-constant number of inputs assuming that the underlying single-input scheme is sub-exponentially secure. Instantiating our construction with existing single-input schemes, we obtain multi-input schemes that are based on a variety of assumptions (such as indistinguishability obfuscation, multilinear maps, learning with errors, and even one-way functions), offering various trade-offs between security assumptions and functionality. Previous and concurrent constructions of multi-input functional encryption schemes either rely on stronger assumptions and provided weaker security guarantees (Goldwasser et al. in Advances in cryptology-EUROCRYPT, 2014; Ananth and Jain in Advances in cryptology-CRYPTO, 2015), or relied on multilinear maps and could be proven secure only in an idealized generic model (Boneh et al. in Advances in cryptology-EUROCRYPT, 2015). In comparison, we present a general transformation that simultaneously relies on weaker assumptions and guarantees stronger security.
引用
收藏
页码:434 / 520
页数:87
相关论文
共 50 条
  • [31] Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors
    Bakas, Alexandros
    Michalas, Antonis
    Frimpong, Eugene
    Rabaninejad, Reyhaneh
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 279 - 299
  • [32] Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
    Boneh, Dan
    Lewi, Kevin
    Raykova, Mariana
    Sahai, Amit
    Zhandry, Mark
    Zimmerman, Joe
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 563 - 594
  • [33] PRIVACY PRESERVING FEDERATED LEARNING FROM MULTI-INPUT FUNCTIONAL PROXY RE-ENCRYPTION
    Feng, Xinyu
    Shen, Qingni
    Li, Cong
    Fang, Yuejian
    Wu, Zhonghai
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 6955 - 6959
  • [34] Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security
    Abou Haidar, Calvin
    Libert, Benoit
    Passelegue, Alain
    PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 11 - 22
  • [35] Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
    Brakerski, Zvika
    Segev, Gil
    JOURNAL OF CRYPTOLOGY, 2014, 27 (02) : 210 - 247
  • [36] Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
    Brakerski, Zvika
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 543 - 560
  • [37] Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
    Zvika Brakerski
    Gil Segev
    Journal of Cryptology, 2014, 27 : 210 - 247
  • [38] Tightly Secure Inner Product Functional Encryption: Multi-input and Function-Hiding Constructions
    Tomida, Junichi
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 459 - 488
  • [39] Tightly secure inner product functional encryption: Multi-input and function-hiding constructions
    Tomida, Junichi
    THEORETICAL COMPUTER SCIENCE, 2020, 833 : 56 - 86
  • [40] 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits
    Carmer, Brent
    Malozemoff, Alex J.
    Raykova, Mariana
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 747 - 764