Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

被引:15
|
作者
Brakerski, Zvika [1 ]
Komargodski, Ilan [1 ]
Segev, Gil [2 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
[2] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, IL-91904 Jerusalem, Israel
基金
以色列科学基金会; 欧洲研究理事会;
关键词
Functional encryption; Private-key; Multi-input functional encryption; Adaptive security;
D O I
10.1007/s00145-017-9261-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct a general-purpose multi-input functional encryption scheme in the private-key setting. Namely, we construct a scheme where a functional key corresponding to a function f enables a user holding encryptions of to compute but nothing else. This is achieved starting from any general-purpose private-key single-input scheme (without any additional assumptions) and is proven to be adaptively secure for any constant number of inputs t. Moreover, it can be extended to a super-constant number of inputs assuming that the underlying single-input scheme is sub-exponentially secure. Instantiating our construction with existing single-input schemes, we obtain multi-input schemes that are based on a variety of assumptions (such as indistinguishability obfuscation, multilinear maps, learning with errors, and even one-way functions), offering various trade-offs between security assumptions and functionality. Previous and concurrent constructions of multi-input functional encryption schemes either rely on stronger assumptions and provided weaker security guarantees (Goldwasser et al. in Advances in cryptology-EUROCRYPT, 2014; Ananth and Jain in Advances in cryptology-CRYPTO, 2015), or relied on multilinear maps and could be proven secure only in an idealized generic model (Boneh et al. in Advances in cryptology-EUROCRYPT, 2015). In comparison, we present a general transformation that simultaneously relies on weaker assumptions and guarantees stronger security.
引用
收藏
页码:434 / 520
页数:87
相关论文
共 50 条
  • [41] Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions
    Agrawal, Shweta
    Kitagawa, Fuyuki
    Modi, Anuja
    Nishimaki, Ryo
    Yamada, Shota
    Yamakawa, Takashi
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 618 - 647
  • [42] Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption
    Datta, Pratish
    Okamoto, Tatsuaki
    Tomida, Junichi
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 245 - 277
  • [43] Public-key encryption in a multi-user setting: Security proofs and improvements
    Bellare, M
    Boldyreva, A
    Micali, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 259 - 274
  • [44] (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption
    Bakas, Alexandros
    Michalas, Antonis
    Ullah, Amjad
    SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 111 - 126
  • [45] Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings
    Abdalla, Michel
    Catalano, Dario
    Fiore, Dario
    Gay, Romain
    Ursu, Bogdan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 597 - 627
  • [46] Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting
    Li, Juyan
    Ma, Chunguang
    Gu, Zhen
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020, 31 (05) : 551 - 567
  • [47] Multi-recipient Public-Key Encryption from Simulators in Security Proofs
    Hiwatari, Harunaga
    Tanaka, Keisuke
    Asano, Tomoyuki
    Sakumoto, Koichi
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 293 - +
  • [48] From Single-Input to Multi-client Inner-Product Functional Encryption
    Abdalla, Michel
    Benhamouda, Fabrice
    Gay, Romain
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 552 - 582
  • [49] Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing
    Belel, Anushree
    Dutta, Ratna
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2024, 2024, 14977 : 101 - 121
  • [50] Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper)
    Datta, Pratish
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 204 - 214