Match Me if You Can: Matchmaking Encryption and Its Applications

被引:32
作者
Ateniese, Giuseppe [1 ]
Francati, Danilo [1 ]
Nunez, David [2 ]
Venturi, Daniele [3 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] NuCypher, San Francisco, CA USA
[3] Sapienza Univ Rome, Rome, Italy
关键词
Secret handshake; Attribute-based encryption; Social matchmaking; Tor; ACCESS-CONTROL ENCRYPTION; FUNCTIONAL ENCRYPTION; PREDICATE ENCRYPTION;
D O I
10.1007/s00145-021-09381-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a new form of encryption that we name matchmaking encryption (ME). Using ME, sender S and receiver R (each with its own attributes) can both specify policies the other party must satisfy in order for the message to be revealed. The main security guarantee is that of privacy-preserving policy matching: During decryption, nothing is leaked beyond the fact that a match occurred/did not occur. ME opens up new ways of secretly communicating and enables several new applications where both participants can specify fine-grained access policies to encrypted data. For instance, in social matchmaking, S can encrypt a file containing his/her personal details and specify a policy so that the file can be decrypted only by his/her ideal partner. On the other end, a receiver R will be able to decrypt the file only if S corresponds to his/her ideal partner defined through a policy. On the theoretical side, we define security for ME, as well as provide generic frameworks for constructing ME from functional encryption. These constructions need to face the technical challenge of simultaneously checking the policies chosen by S and R, to avoid any leakage. On the practical side, we construct an efficient identity-based scheme for equality policies, with provable security in the random oracle model under the standard BDH assumption. We implement and evaluate our scheme and provide experimental evidence that our construction is practical. We also apply identity-based ME to a concrete use case, in particular for creating an anonymous bulletin board over a Tor network.
引用
收藏
页数:50
相关论文
共 72 条
  • [1] Simplifying Design and Analysis of Complex Predicate Encryption Schemes
    Agrawal, Shashank
    Chase, Melissa
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 : 627 - 656
  • [2] Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
    Agrawal, Shashank
    Wu, David J.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 30 - 61
  • [3] A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
    Agrawal, Shashank
    Chase, Melissa
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 : 259 - 288
  • [4] Charm: a framework for rapidly prototyping cryptosystems
    Akinyele, Joseph A.
    Garman, Christina
    Miers, Ian
    Pagano, Matthew W.
    Rushanan, Michael
    Green, Matthew
    Rubin, Aviel D.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) : 111 - 128
  • [5] Alwen Joel, 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P65, DOI 10.1007/978-3-642-45239-0_5
  • [6] Ananth P., 2018, Cryptology ePrint Archive, Report 2018/615
  • [7] [Anonymous], 2004, P 11 ACM C COMP COMM
  • [8] [Anonymous], 2018, TOR ONION SERVICE PR
  • [9] Ateniese Giuseppe., 2007, NDSS, P1
  • [10] Attrapadung Nuttapong, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P87, DOI 10.1007/978-3-319-16715-2_5