Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions

被引:3
|
作者
Agrawal, Shweta [1 ]
Kitagawa, Fuyuki [2 ]
Modi, Anuja [1 ]
Nishimaki, Ryo [2 ]
Yamada, Shota [3 ]
Yamakawa, Takashi [2 ]
机构
[1] IIT Madras, Chennai, Tamil Nadu, India
[2] NTT Social Informat Labs, Tokyo, Japan
[3] AIST, Tokyo, Japan
来源
关键词
Turing machines; Functional encryption; Attribute based encryption;
D O I
10.1007/978-3-031-22318-1_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent work of Agrawal et al. [Crypto '21] and Goyal et al. [Eurocrypt '22] concurrently introduced the notion of dynamic bounded collusion security for functional encryption (FE) and showed a construction satisfying the notion from identity based encryption (IBE). Agrawal et al. [Crypto '21] further extended it to FE for Turing machines in non-adaptive simulation setting from the sub-exponential learining with errors assumption (LWE). Concurrently, the work of Goyal et al. [Asiacrypt '21] constructed attribute based encryption (ABE) for Turing machines achieving adaptive indistinguishability based security against bounded (static) collusions from IBE, in the random oracle model. In this work, we significantly improve the state of art for dynamic bounded collusion FE and ABE for Turing machines by achieving adaptive simulation style security from a broad class of assumptions, in the standard model. In more detail, we obtain the following results: 1. We construct an adaptively secure (AD-SIM) FE for Turing machines, supporting dynamic bounded collusion, from sub-exponential LWE. This improves the result of Agrawal et al. which achieved only non-adaptive (NA-SIM) security in the dynamic bounded collusion model. 2. Towards achieving the above goal, we construct a ciphertext policy FE scheme (CPFE) for circuits of unbounded size and depth, which achieves AD-SIM security in the dynamic bounded collusion model from IBE and laconic oblivious transfer (LOT). Both IBE and LOT can be instantiated from a large number of mild assumptions such as the computational DiffieHellman assumption, the factoring assumption, and polynomial LWE. This improves the construction of Agrawal et al. which could only achieve NA-SIM security for CPFE supporting circuits of unbounded depth from IBE. 3. We construct anAD-SIM secure FE for Turingmachines, supporting dynamic bounded collusions, from LOT, ABE for NC1 (orNC) and private information retrieval (PIR) schemes which satisfy certain properties. This significantly expands the class of assumptions on which AD-SIM secure FE for Turing machines can be based. In particular, it leads to new constructions of FE for Turing machines including one based on polynomial LWE and one based on the combination of the bilinear decisional Diffie-Hellman assumption and the decisional Diffie-Hellman assumption on some specific groups. In contrast the only prior construction by Agrawal et al. achieved only NA-SIM security and relied on sub-exponential LWE. To achieve the above result, we define the notion of CPFE for read only RAM programs and succinct FE for LOT, which may be of independent interest. 4. We also construct an ABE scheme for Turing machines which achieves AD-IND security in the standard model supporting dynamic bounded collusions. Our scheme is based on IBE and LOT. Previously, the only known candidate that achieved AD-IND security from IBE by Goyal et al. relied on the random oracle model.
引用
收藏
页码:618 / 647
页数:30
相关论文
共 35 条
  • [1] Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE
    Agrawal, Shweta
    Maitra, Monosij
    Vempati, Narasimha Sai
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 239 - 269
  • [2] Functional Encryption for Turing Machines
    Ananth, Prabhanjan
    Sahai, Amit
    THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 125 - 153
  • [3] From Selective to Adaptive Security in Functional Encryption
    Ananth, Prabhanjan
    Brakerski, Zvika
    Segev, Gil
    Vaikuntanathan, Vinod
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 657 - 677
  • [4] FE and iO for Turing Machines from Minimal Assumptions
    Agrawal, Shweta
    Maitra, Monosij
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 473 - 512
  • [5] Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions
    Boyen, Xavier
    Li, Qinyi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 267 - 284
  • [6] Attribute Based Encryption for Turing Machines from Lattices
    Agrawal, Shweta
    Kumari, Simran
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT III, 2024, 14922 : 352 - 386
  • [7] Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
    Hemenway, Brett
    Libert, Benoit
    Ostrovsky, Rafail
    Vergnaud, Damien
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 70 - +
  • [8] Statistically Consistent Broadcast Authenticated Encryption with Keyword Search Adaptive Security from Standard Assumptions
    Mukherjee, Sayantan
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 523 - 552
  • [9] Short attribute-based signatures for arbitrary Turing machines from standard assumptions
    Pratish Datta
    Ratna Dutta
    Sourav Mukhopadhyay
    Designs, Codes and Cryptography, 2023, 91 : 1845 - 1872
  • [10] Short attribute-based signatures for arbitrary Turing machines from standard assumptions
    Datta, Pratish
    Dutta, Ratna
    Mukhopadhyay, Sourav
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (05) : 1845 - 1872