Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices

被引:2
|
作者
Hsieh, Yao-Ching [1 ]
Lin, Huijia [1 ]
Luo, Ji [1 ]
机构
[1] Univ Washington, Paul G Allen Sch Comp Sci & Engn, Seattle, WA 98195 USA
关键词
D O I
10.1109/FOCS57990.2023.00031
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although we have known about fully homomorphic encryption (FHE) from circular security assumptions for over a decade [Gentry, FOCS '10; Brakerski-Vaikuntanathan, STOC '11], there is still a significant gap in understanding related homomorphic primitives supporting all unrestricted polynomial-size computations. One prominent example is attribute-based encryption (ABE). The state-of-the-art constructions, relying on the hardness of learning with errors (LWE) [Gorbunov-Vaikuntanathan-Wee, STOC '13; Boneh et al., Eurocrypt '14], only accommodate circuits up to all predetermined depth, akin to leveled homomorphic encryption. In addition, their components (master public key, secret keys, and ciphertexts) have sizes polynomial in the maximum circuit depth. Even in the simpler setting where a single key is published (or a single circuit is involved), the depth dependency persists, showing up in constructions of 1-key ABE and related primitives, including laconic function evaluation (LFE), 1-key functional encryption (FE), and reusable garbling schemes. So far, the only approach of eliminating depth dependency relies on indistinguishability obfuscation. Intriguingly, for over a decade, it has remained unclear whether the circular security assumptions empowering FHE can similarly benefit ABE. In this work, we introduce new lattice-based techniques to overcome the depth-dependency limitations: center dot Relying on a circular security assumption, we construct LFE, 1-key FE, 1-key ABE, and reusable garbling schemes capable of evaluating circuits of unbounded depth and size. center dot Based on the evasive circular LWE assumption, a stronger variant of the recently proposed evasive LWE assumption [Wee, Eurocrypt '22; Tsabary, Crypto '22], we construct a full-fledged ABE scheme for circuits of unbounded depth and size. Our constructions eliminate the multiplicative overheads polynomial in depth from previous constructions. Our LFE, 1-key FE, and reusable garbling schemes achieve almost optimal succinctness. Their ciphertexts and input encodings are proportional in length to the input, while function digest, secret keys, and garbled circuits maintain a constant size independent of circuit parameters. Our ABE schemes offer short components, with master public key and ciphertext sizes linear in the attribute length and secret key being constant-size.
引用
收藏
页码:415 / 434
页数:20
相关论文
共 50 条
  • [1] Attribute-Based Encryption for Circuits on Lattices
    Zhao, Jian
    Gao, Haiying
    Zhang, Junqi
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 463 - 469
  • [2] Attribute-Based Encryption for Circuits on Lattices
    Jian Zhao
    Haiying Gao
    Junqi Zhang
    [J]. Tsinghua Science and Technology, 2014, 19 (05) : 463 - 469
  • [3] Attribute-Based Encryption for Restricted Circuits from Lattices
    Zhao Jian
    Gao Haiying
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 450 - 454
  • [4] Attribute-Based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
    El Kaafarani, Ali
    Katsumata, Shuichi
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 89 - 119
  • [5] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554
  • [6] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. JOURNAL OF THE ACM, 2015, 62 (06)
  • [7] Unbounded HIBE and Attribute-Based Encryption
    Lewko, Allison
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 547 - 567
  • [8] Attribute-Based Functional Encryption on Lattices
    Boyen, Xavier
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 122 - 142
  • [9] Revocable attribute-based encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Haiyan
    Wang, Fuqun
    Chen, Kefei
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [10] Ciphertext Policy Attribute-Based Encryption from Lattices
    Zhang, Jiang
    Zhang, Zhenfeng
    Ge, Aijun
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,