Tightly secure inner product functional encryption: Multi-input and function-hiding constructions

被引:4
|
作者
Tomida, Junichi [1 ]
机构
[1] NTT Corp, 3-9-11 Midori Cho, Musashino, Tokyo 1808585, Japan
关键词
Functional encryption; Inner product; Tight security; Multi-input; Function-hiding;
D O I
10.1016/j.tcs.2020.05.008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Tightly secure cryptographic schemes have been extensively studied in the fields of chosen-ciphertext secure public-key encryption (CCA-secure PKE), identity-based encryption (IBE), signatures and more. We extend tightly secure cryptography to inner product functional encryption (IPFE) and present the first tightly secure schemes related to IPFE. We first construct a new IPFE schemes that are tightly secure in the multi-user and multi-challenge setting. In other words, the security of our schemes do not degrade even if an adversary obtains many ciphertexts generated by many users. Our schemes are constructible on a pairing-free group and secure under the matrix decisional Diffie-Hellman (MDDH) assumption, which is the generalization of the decisional Diffie-Hellman (DDH) assumption. Applying the known conversions by Lin (CRYPTO 2017) and Abdalla et al. (CRYPTO 2018) to our schemes, we can obtain the first tightly secure function-hiding IPFE schemes and multi-input IPFE (MIPFE) schemes respectively. Our second main contribution is the proposal of a new generic conversion from function-hiding IPFE to function-hiding MIPFE, which was left as an open problem by Abdalla et al. (CRYPTO 2018). We can obtain the first tightly secure function-hiding MIPFE schemes by applying our conversion to the tightly secure function-hiding IPFE schemes described above. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:56 / 86
页数:31
相关论文
共 50 条
  • [31] Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security
    Tomida, Junichi
    Abe, Masayuki
    Okamoto, Tatsuaki
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 408 - 425
  • [32] Verifiable Decentralized Multi-client Functional Encryption for Inner Product
    Nguyen, Dinh Duy
    Phan, Duong Hieu
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT V, 2023, 14442 : 33 - 65
  • [33] Toward more secure constructions of flexible multi-client functional encryption schemes
    Rafiee, Mojtaba
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (04):
  • [34] A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency
    Castagnos, Guilhem
    Laguillaumie, Fabien
    Tucker, Ida
    THEORETICAL COMPUTER SCIENCE, 2022, 914 : 84 - 113
  • [35] Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors
    Bakas, Alexandros
    Michalas, Antonis
    Frimpong, Eugene
    Rabaninejad, Reyhaneh
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 279 - 299
  • [36] PRIVACY PRESERVING FEDERATED LEARNING FROM MULTI-INPUT FUNCTIONAL PROXY RE-ENCRYPTION
    Feng, Xinyu
    Shen, Qingni
    Li, Cong
    Fang, Yuejian
    Wu, Zhonghai
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 6955 - 6959
  • [37] 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits
    Carmer, Brent
    Malozemoff, Alex J.
    Raykova, Mariana
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 747 - 764
  • [38] CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
    Benhamouda, Fabrice
    Bourse, Florian
    Lipmaa, Helger
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 36 - 66
  • [39] Multi-bit Functional Encryption for Inner Product Predicate over Lattice
    Jiang, Mingming
    Chen, Qihong
    Guo, Yuyan
    Zhang, Dongbing
    International Journal of Network Security, 2022, 24 (06) : 1106 - 1113
  • [40] Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
    Zvika Brakerski
    Ilan Komargodski
    Gil Segev
    Journal of Cryptology, 2018, 31 : 434 - 520