Optimal Broadcast Encryption from LWE and Pairings in the Standard Model

被引:21
作者
Agrawal, Shweta [1 ]
Wichs, Daniel [2 ,3 ]
Yamada, Shota [4 ]
机构
[1] IIT Madras, Chennai, Tamil Nadu, India
[2] Northeastern Univ, Boston, MA 02115 USA
[3] NTT Res Inc, Boston, MA USA
[4] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
来源
THEORY OF CRYPTOGRAPHY, TCC 2020, PT I | 2020年 / 12550卷
关键词
CONSTANT-SIZE CIPHERTEXTS; ADAPTIVE SECURITY; OBFUSCATION;
D O I
10.1007/978-3-030-64375-1_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast Encryption with optimal parameters was a long-standing problem, whose first solution was provided in an elegant work by Boneh, Waters and Zhandry [BWZ14]. However, this work relied on multilinear maps of logarithmic degree, which is not considered a standard assumption. Recently, Agrawal and Yamada [AY20] improved this state of affairs by providing the first construction of optimal broadcast encryption from Bilinear Maps and Learning With Errors (LWE). However, their proof of security was in the generic bilinear group model. In this work, we improve upon their result by providing a new construction and proof in the standard model. In more detail, we rely on the Learning With Errors (LWE) assumption and the Knowledge of OrthogonALity Assumption (KOALA) [BW19] on bilinear groups. Our construction combines three building blocks: a (computational) nearly linear secret sharing scheme with compact shares which we construct from LWE, an inner-product functional encryption scheme with special properties which is constructed from the bilinear Matrix Decision Diffie Hellman (MDDH) assumption, and a certain form of hyperplane obfuscation, which is constructed using the KOALA assumption. While similar to that of Agrawal and Yamada, our construction provides a new understanding of how to decompose the construction into simpler, modular building blocks with concrete and easy-to-understand security requirements for each one. We believe this sheds new light on the requirements for optimal broadcast encryption, which may lead to new constructions in the future.
引用
收藏
页码:149 / 178
页数:30
相关论文
共 34 条
  • [1] Abdalla M., 2015, 2015017 CRYPT EPRINT
  • [2] Optimal Broadcast Encryption from Pairings and LWE
    Agrawal, Shweta
    Yamada, Shota
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 13 - 43
  • [3] Attrapadung N, 2010, LECT NOTES COMPUT SC, V6056, P384
  • [4] Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
    Baltico, Carmen Elisabetta Zaira
    Catalano, Dario
    Fiore, Dario
    Gay, Romain
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 67 - 98
  • [5] Barthe G, 2014, LECT NOTES COMPUT SC, V8616, P95, DOI 10.1007/978-3-662-44371-2_6
  • [6] Bitansky N, 2010, LECT NOTES COMPUT SC, V6223, P520, DOI 10.1007/978-3-642-14623-7_28
  • [7] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
  • [8] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
    Boneh, Dan
    Zhandry, Mark
    [J]. ALGORITHMICA, 2017, 79 (04) : 1233 - 1285
  • [9] Boneh D, 2014, LECT NOTES COMPUT SC, V8616, P206, DOI 10.1007/978-3-662-44371-2_12
  • [10] Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30