Verifiable Decentralized Multi-client Functional Encryption for Inner Product

被引:4
作者
Nguyen, Dinh Duy [1 ]
Phan, Duong Hieu [1 ]
Pointcheval, David [2 ]
机构
[1] Inst Polytech Paris, LTCI, Telecom Paris, Palaiseau, France
[2] PSL Univ, CNRS, Inria, Ecole Normale Super,DIENS, Paris, France
来源
ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT V | 2023年 / 14442卷
关键词
Verifiability; Decentralized; Functional Encryption; Inner Product;
D O I
10.1007/978-981-99-8733-7_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Joint computation on encrypted data is becoming increasingly crucial with the rise of cloud computing. In recent years, the development of multi-client functional encryption (MCFE) has made it possible to perform joint computation on private inputs, without any interaction. Well-settled solutions for linear functions have become efficient and secure, but there is still a shortcoming: if one user inputs incorrect data, the output of the function might become meaningless for all other users (while still useful for the malicious user). To address this issue, the concept of verifiable functional encryption was introduced by Badrinarayanan et al. at Asiacrypt '16 (BGJS). However, their solution was impractical because of strong statistical requirements. More recently, Bell et al. introduced a related concept for secure aggregation, with their ACORN solution, but it requires multiple rounds of interactions between users. In this paper, - we first propose a computational definition of verifiability for MCFE. Our notion covers the computational version of BGJS and extends it to handle any valid inputs defined by predicates. The BGJS notion corresponds to the particular case of a fixed predicate in our setting; - we then introduce a new technique called Combine-then-Descend, which relies on the class group. It allows us to construct One-time Decentralized Sum (ODSUM) on verifiable private inputs. ODSUM is the building block for our final protocol of a verifiable decentralized MCFE for inner-product, where the inputs are within a range. Our approach notably enables the efficient identification of malicious users, thereby addressing an unsolved problem in ACORN.
引用
收藏
页码:33 / 65
页数:33
相关论文
共 25 条
[1]   From Single-Input to Multi-client Inner-Product Functional Encryption [J].
Abdalla, Michel ;
Benhamouda, Fabrice ;
Gay, Romain .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 :552-582
[2]  
Abdalla M, 2019, LECT NOTES COMPUT SC, V11443, P128, DOI 10.1007/978-3-030-17259-6_5
[3]   Non-Interactive Zero-Knowledge Proofs for Composite Statements [J].
Agrawal, Shashank ;
Ganesh, Chaya ;
Mohassel, Payman .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 :643-673
[4]   Fully Secure Functional Encryption for Inner Products, from Standard Assumptions [J].
Agrawal, Shweta ;
Libert, Benoit ;
Stehle, Damien .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :333-362
[5]   Verifiable Functional Encryption [J].
Badrinarayanan, Saikrishna ;
Goyal, Vipul ;
Jain, Aayush ;
Sahai, Amit .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 :557-587
[6]  
Bell J., 2022, Report 2022/1461
[7]  
Blum M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P103, DOI 10.1145/62212.62222
[8]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[9]   Bulletproofs: Short Proofs for Confidential Transactions and More [J].
Bunz, Benedikt ;
Bootle, Jonathan ;
Boneh, Dan ;
Poelstra, Andrew ;
Wuille, Pieter ;
Maxwell, Greg .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :315-334
[10]  
Castagnos Guilhem, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P487, DOI 10.1007/978-3-319-16715-2_26