From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

被引:33
作者
Bitansky, Nir [1 ]
Nishimaki, Ryo [2 ]
Passelegue, Alain [3 ]
Wichs, Daniel [4 ]
机构
[1] MIT, Cambridge, MA 02139 USA
[2] Nippon Telegraph & Tel Corp, Secure Platform Labs, Tokyo, Japan
[3] ENS, Paris, France
[4] Northeastern Univ, Boston, MA 02115 USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II | 2016年 / 9986卷
关键词
D O I
10.1007/978-3-662-53644-5_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Functional encryption lies at the frontiers of current research in cryptography; some variants have been shown sufficiently powerful to yield indistinguishability obfuscation (IO) while other variants have been constructed from standard assumptions such as LWE. Indeed, most variants have been classified as belonging to either the former or the latter category. However, one mystery that has remained is the case of secret-key functional encryption with an unbounded number of keys and cipher-texts. On the one hand, this primitive is not known to imply anything outside of minicrypt, the land of secret-key crypto, but on the other hand, we do no know how to construct it without the heavy hammers in obfustopia. In this work, we show that (subexponentially secure) secret-key functional encryption is powerful enough to construct indistinguishability obfuscation if we additionally assume the existence of (subexponentially secure) plain public-key encryption. In other words, secret-key functional encryption provides a bridge from cryptomania to obfustopia. On the technical side, our result relies on two main components. As our first contribution, we show how to use secret key functional encryption to get "exponentially- efficient indistinguishability obfuscation" (XIO), a notion recently introduced by Lin et al. (PKC '16) as a relaxation of IO. Lin et al. show how to use XIO and the LWE assumption to build IO. As our second contribution, we improve on this result by replacing its reliance on the LWE assumption with any plain public-key encryption scheme.
引用
收藏
页码:391 / 418
页数:28
相关论文
共 50 条
[1]  
Agrawal S, 2013, LECT NOTES COMPUT SC, V8043, P500, DOI 10.1007/978-3-642-40084-1_28
[2]  
Ananth P., 2015, Paper 2015/730
[3]   Functional Encryption for Turing Machines [J].
Ananth, Prabhanjan ;
Sahai, Amit .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 :125-153
[4]   From Selective to Adaptive Security in Functional Encryption [J].
Ananth, Prabhanjan ;
Brakerski, Zvika ;
Segev, Gil ;
Vaikuntanathan, Vinod .
ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 :657-677
[5]   Indistinguishability Obfuscation from Compact Functional Encryption [J].
Ananth, Prabhanjan ;
Jain, Abhishek .
ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 :308-326
[6]  
[Anonymous], IACR CRYPTOLOGY EPRI
[7]  
[Anonymous], IACR CRYPTOLOGY EPRI
[8]   Limits on the Power of Indistinguishability Obfuscation and Functional Encryption [J].
Asharov, Gilad ;
Segev, Gil .
2015 IEEE 56TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2015, :191-209
[9]   Multi-input Functional Encryption for Unbounded Arity Functions [J].
Badrinarayanan, Saikrishna ;
Gupta, Divya ;
Jain, Abhishek ;
Sahai, Amit .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 :27-51
[10]  
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1