Functional Encryption for Bounded Collusions, Revisited

被引:16
作者
Agrawal, Shweta [1 ]
Rosen, Alon [2 ]
机构
[1] IIT Madras, Chennai, Tamil Nadu, India
[2] IDC Herzliya, Efi Arazi Sch Comp Sci, Herzliyya, Israel
来源
THEORY OF CRYPTOGRAPHY, TCC 2017, PT I | 2017年 / 10677卷
关键词
IDENTITY-BASED ENCRYPTION; PREDICATE ENCRYPTION; MULTILINEAR MAP; CRYPTANALYSIS;
D O I
10.1007/978-3-319-70500-2_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide a new construction of functional encryption (FE) for circuits in the bounded collusion model. In this model, security of the scheme is guaranteed as long as the number of colluding adversaries can be a-priori bounded by some polynomial Q. Our construction supports arithmetic circuits in contrast to all prior work which support Boolean circuits. The ciphertext of our scheme is sublinear in the circuit size for the circuit class NC1; this implies the first construction of arithmetic reusable garbled circuits for NC1. Additionally, our construction achieves several desirable features: - Our construction for reusable garbled circuits for NC1 achieves the optimal "full" simulation based security. - When generalised to handle Q queries for any fixed polynomial Q, our ciphertext size grows additively with Q2. In contrast, previous works that achieve full security [5,39] suffered a multiplicative growth of Q4. - The ciphertext of our scheme can be divided into a succinct data dependent component and a non-succinct data independent component. This makes it well suited for optimization in an online-offline model that allows a majority of the computation to be performed in an offline phase, before the data becomes available. Security of our reusable garbled circuits construction for NC1 is based on the Ring Learning With Errors assumption (RLWE), while the bounded collusion construction (with non-succinct ciphertext) may also be based on the standard Learning with Errors (LWE) assumption. To achieve our result, we provide new public key and ciphertext evaluation algorithms. These algorithms are general, and may find application elsewhere.
引用
收藏
页码:173 / 205
页数:33
相关论文
共 54 条
[1]   Simple Functional Encryption Schemes for Inner Products [J].
Abdalla, Michel ;
Bourse, Florian ;
De Caro, Angelo ;
Pointcheval, David .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :733-751
[2]  
Agrawal S., 2016, CRYPTO
[3]  
Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
[4]   Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks [J].
Agrawal, Shweta .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 :3-35
[5]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[6]  
Ananth P., 2015, INDISTINGUISHABILITY, V2015
[7]   Indistinguishability Obfuscation from Compact Functional Encryption [J].
Ananth, Prabhanjan ;
Jain, Abhishek .
ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 :308-326
[8]  
[Anonymous], 2016, FUNCTIONAL ENCRYPTIO
[9]   Computationally private randomizing polynomials and their applications [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
COMPUTATIONAL COMPLEXITY, 2006, 15 (02) :115-162
[10]   How to Garble Arithmetic Circuits [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :120-129