Lower Bounds on Assumptions Behind Registration-Based Encryption

被引:1
|
作者
Hajiabadi, Mohammad [1 ]
Mahmoody, Mohammad [2 ]
Qi, Wei [2 ]
Sarfaraz, Sara [1 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
[2] Univ Virginia, Charlottesville, VA USA
来源
基金
加拿大自然科学与工程研究理事会;
关键词
Registration-based encryption; Black-box separations; Trapdoor permutations; Generic group model; IDENTITY-BASED ENCRYPTION;
D O I
10.1007/978-3-031-48618-0_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Registration-based encryption (RBE) [11] is a primitive that aims to offer what identity-based encryption (IBE) [2] offers without the so-called key-escrow problem. In RBE parties who wish to join the system will generate their own secret and public keys and register their public keys to a transparent party called key curator (KC) who does not have any secret state. The initial constructions of RBE made non-black-box use of building block primitives, due to their use of either indistinguishability obfuscation [11] or some garbling scheme [12]. More recently, it was shown [14,17] how to achieve black-box constructions of (variants of) RBE and even stronger primitives based on bilinear maps in which the RBE is relaxed to have a CRS whose length can grow with the number of registered identities. Making cryptographic constructions in general, and RBE in particular, black-box is an important step as it can play a significant role in its efficiency and potential deployment. Hence, in this work we ask: what are the minimal assumptions for black-box constructions of RBE? Particularly, can we black-box construct RBE schemes from the same assumptions used for public-key encryption or simpler algebraic assumptions that hold in the generic group model? In this work, we prove the first black-box separation results for RBE beyond the separations that follow from the observation that RBE black-box implies public-key encryption. In particular, we answer both of the questions above negatively and prove that neither trapdoor permutations nor (even Shoup's) generic group model can be used as the sole source of hardness for building RBE schemes. More generally, we prove that a relaxation of RBE in which all the keys are registered and compressed at the same time is already too complex to be built from either of the above-mentioned primitives in a black-box way. At a technical level, using compression techniques, we prove lemmas in the TDP and GGM oracle settings that prove the following intuitive yet useful fact: that compact strings cannot signal too many trapdoors, even if their generation algorithm takes exponential time. Due to their generality, our lemmas could be of independent interest and find more applications.
引用
收藏
页码:306 / 334
页数:29
相关论文
共 50 条
  • [1] Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption
    Mahmoody, Mohammad
    Qi, Wei
    Rahimi, Ahmadreza
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 559 - 587
  • [2] Efficient Registration-Based Encryption
    Glaeser, Noemi
    Kolonelos, Dimitris
    Malavolta, Giulio
    Rahimi, Ahmadreza
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1065 - 1079
  • [3] Verifiable Registration-Based Encryption
    Goyal, Rishab
    Vusirikala, Satyanarayana
    ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 621 - 651
  • [4] Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
    Mahmoody, Mohammad
    Mohammed, Ameer
    Nematihaji, Soheil
    Pass, Rafael
    Shelat, Abhi
    THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 49 - 66
  • [5] Novel registration-based framework for CT angiography in lower legs
    Roman Peter
    Milos Malinsky
    Petr Ourednicek
    Lukas Lambert
    Jiri Jan
    Medical & Biological Engineering & Computing, 2013, 51 : 1079 - 1089
  • [6] Novel registration-based framework for CT angiography in lower legs
    Peter, Roman
    Malinsky, Milos
    Ourednicek, Petr
    Lambert, Lukas
    Jan, Jiri
    MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2013, 51 (10) : 1079 - 1089
  • [7] Registration-Based Encryption: Removing Private-Key Generator from IBE
    Garg, Sanjam
    Hajiabadi, Mohammad
    Mahmoody, Mohammad
    Rahimi, Ahmadreza
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 689 - 718
  • [8] Registration-based interpolation
    Penney, GP
    Schnabel, JA
    Rueckert, D
    Viergever, MA
    Niessen, WJ
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2004, 23 (07) : 922 - 926
  • [9] Registration-Based Language Abstractions
    Davis, Samuel
    Kiczales, Gregor
    ACM SIGPLAN NOTICES, 2010, 45 (10) : 754 - 773
  • [10] Lower bounds for Subset Cover based Broadcast Encryption
    Austrin, Per
    Kreitz, Gunnar
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 343 - +