Private Puncturable PRFs from Standard Lattice Assumptions

被引:43
作者
Boneh, Dan [1 ]
Kim, Sam [1 ]
Montgomery, Hart [2 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Fujitsu Labs Amer, Sunnyvale, CA USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I | 2017年 / 10210卷
基金
美国国家科学基金会;
关键词
PREDICATE ENCRYPTION; IDENTITY;
D O I
10.1007/978-3-319-56620-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A puncturable pseudorandom function (PRF) has a master key k that enables one to evaluate the PRF at all points of the domain, and has a punctured key k(x) that enables one to evaluate the PRF at all points but one. The punctured key kx reveals no information about the value of the PRF at the punctured point x. Punctured PRFs play an important role in cryptography, especially in applications of indistinguishability obfuscation. However, in previous constructions, the punctured key k(x) completely reveals the punctured point x: given k(x) it is easy to determine x. A private puncturable PRF is one where k(x) reveals nothing about x. This concept was defined by Boneh, Lewi, and Wu, who showed the usefulness of private puncturing, and gave constructions based on multilinear maps. The question is whether private puncturing can be built from a standard (weaker) cryptographic assumption. We construct the first privately puncturable PRF from standard lattice assumptions, namely learning with errors (LWE) and 1 dimensional short integer solutions (1D-SIS), which have connections to worst-case hardness of general lattice problems. Our starting point is the (non-private) PRF of Brakerski and Vaikuntanathan. We introduce a number of new techniques to enhance this PRF, from which we obtain a privately puncturable PRF. In addition, we also study the simulation based definition of private constrained PRFs for general circuits, and show that the definition is not satisfiable.
引用
收藏
页码:415 / 445
页数:31
相关论文
共 62 条
[21]   Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation [J].
Boneh, Dan ;
Zhandry, Mark .
ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 :480-499
[22]  
Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30
[23]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8270, P280, DOI 10.1007/978-3-642-42045-0_15
[24]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[25]   Function Secret Sharing [J].
Boyle, Elette ;
Gilboa, Niv ;
Ishai, Yuval .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :337-367
[26]  
Boyle E, 2014, LECT NOTES COMPUT SC, V8383, P501, DOI 10.1007/978-3-642-54631-0_29
[27]  
Brakerski Z., 2014, ITCS
[28]   Targeted Homomorphic Attribute-Based Encryption [J].
Brakerski, Zvika ;
Cash, David ;
Tsabary, Rotem ;
Wee, Hoeteck .
THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 :330-360
[29]   Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts [J].
Brakerski, Zvika ;
Perlman, Renen .
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 :190-213
[30]   Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :363-384