Multi-input Functional Encryption with Unbounded-Message Security

被引:4
|
作者
Goyal, Vipul [1 ]
Jain, Aayush [2 ]
O'Neill, Adam [3 ]
机构
[1] Microsoft Res, Bengaluru, India
[2] Univ Calif Los Angeles, Ctr Encrypted Funct, Los Angeles, CA 90009 USA
[3] Georgetown Univ, Washington, DC USA
关键词
D O I
10.1007/978-3-662-53890-6_18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-input functional encryption (MIFE) was introduced by Goldwasser et al. (EUROCRYPT 2014) as a compelling extension of functional encryption. In MIFE, a receiver is able to compute a joint function of multiple, independently encrypted plaintexts. Goldwasser et al. ( EUROCRYPT 2014) show various applications of MIFE to running SQL queries over encrypted databases, computing over encrypted data streams, etc. The previous constructions of MIFE due to Goldwasser et al. (EUROCRYPT 2014) based on indistinguishability obfuscation had a major shortcoming: it could only support encrypting an a priori bounded number of message. Once that bound is exceeded, security is no longer guaranteed to hold. In addition, it could only support selective-security, meaning that the challenge messages and the set of "corrupted" encryption keys had to be declared by the adversary up-front. In this work, we show how to remove these restrictions by relying instead on sub-exponentially secure indistinguishability obfuscation. This is done by carefully adapting an alternative MIFE scheme of Goldwasser et al. that previously overcame these shortcomings (except for selective security wrt. the set of "corrupted" encryption keys) by relying instead on differing-inputs obfuscation, which is now seen as an implausible assumption. Our techniques are rather generic, and we hope they are useful in converting other constructions using differing-inputs obfuscation to ones using sub-exponentially secure indistinguishability obfuscation instead.
引用
收藏
页码:531 / 556
页数:26
相关论文
共 50 条
  • [1] Multi-input Functional Encryption for Unbounded Arity Functions
    Badrinarayanan, Saikrishna
    Gupta, Divya
    Jain, Abhishek
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 27 - 51
  • [2] Multi-input Functional Encryption
    Goldwasser, Shafi
    Gordon, S. Dov
    Goyal, Vipul
    Jain, Abhishek
    Katz, Jonathan
    Liu, Feng-Hao
    Sahai, Amit
    Shi, Elaine
    Zhou, Hong-Sheng
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 578 - 602
  • [3] Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality
    Agrawal, Shweta
    Goyal, Rishab
    Tomida, Junichi
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 711 - 740
  • [4] Multi-Input Functional Encryption with Controlled Decryption
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Hirano, Takato
    Kawai, Yutaka
    Koseki, Yoshihiro
    Schuldt, Jacob C. N.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (07) : 968 - 978
  • [5] Multi-input Quadratic Functional Encryption from Pairings
    Agrawal, Shweta
    Goyal, Rishab
    Tomida, Junichi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 208 - 238
  • [6] Multi-Input Functional Encryption based Electronic Voting Scheme
    Yang, Chen
    You, Lin
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 134 - 138
  • [7] Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
    Zvika Brakerski
    Ilan Komargodski
    Gil Segev
    Journal of Cryptology, 2018, 31 : 434 - 520
  • [8] Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
    Brakerski, Zvika
    Komargodski, Ilan
    Segev, Gil
    JOURNAL OF CRYPTOLOGY, 2018, 31 (02) : 434 - 520
  • [9] Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
    Brakerski, Zvika
    Komargodski, Ilan
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 852 - 880
  • [10] Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption
    Datta, Pratish
    Okamoto, Tatsuaki
    Tomida, Junichi
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 245 - 277