COLLUSION RESISTANT TRAITOR TRACING FROM LEARNING WITH ERRORS

被引:2
作者
Goyal, Rishab [1 ]
Koppula, Venkata [1 ]
Waters, Brent [1 ]
机构
[1] Univ Texas Austin, Dept Comp Sci, Austin, TX 78712 USA
关键词
traitor tracing; private linear broadcast encryption; functional encryption; Mixed FE; attribute-based encryption; lattice trapdoors; encryption; decryption; learning with errors; COMBINATORIAL PROPERTIES; FUNCTIONAL ENCRYPTION; MULTILINEAR MAP; TRACEABILITY; CRYPTANALYSIS; FRAMEPROOF;
D O I
10.1137/18M1197825
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work we provide a traitor tracing construction with ciphertexts that grow polynomially in log(n), where n is the number of users, and prove it secure under the learning with errors (LWE) assumption. This is the first traitor tracing scheme with such parameters provably secure from a standard assumption. In addition to achieving new traitor tracing results, we believe our techniques push forward the broader area of computing on encrypted data under standard assumptions. Notably, traitor tracing is a substantially different problem from other cryptography primitives that have seen recent progress in LWE solutions. We achieve our results by first conceiving a novel approach to building traitor tracing that starts with a new form of functional encryption that we call Mixed FE. In a Mixed FE system the encryption algorithm is bimodal and works with either a public key or master secret key. Ciphertexts encrypted using the public key can only encrypt one type of functionality. On the other hand, the secret key encryption can be used to encode many different types of programs, but is only secure as long as the attacker sees a bounded number of such ciphertexts. We first show how to combine mixed FE with attribute-based encryption to achieve traitor tracing. Second, we build Mixed FE systems for polynomial-sized branching programs (which corresponds to the complexity class logspace) by relying on the polynomial hardness of the LWE assumption with superpolynomial modulus-to-noise ratio.
引用
收藏
页数:148
相关论文
共 81 条
  • [1] Abdalla M., 2007, P PUBL KEY CRYPT PKC
  • [2] Efficient Public Trace and Revoke from Standard Assumptions
    Agrawal, Shweta
    Bhattacherjee, Sanjay
    Duong Hieu Phan
    Stehle, Damien
    Yamada, Shota
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2277 - 2293
  • [3] Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
    Agrawal, Shweta
    Libert, Benoit
    Stehle, Damien
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 333 - 362
  • [4] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
  • [5] Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
  • [6] [Anonymous], 1994, LNCS
  • [7] [Anonymous], 2006, EUROCRYPT
  • [8] Apon D., 2016, 20161003 CRYPT EPRIN
  • [9] Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
  • [10] Asharov Gilad., 2011, Report 2011/613, P613