Multi-input Functional Encryption with Unbounded-Message Security

被引:4
|
作者
Goyal, Vipul [1 ]
Jain, Aayush [2 ]
O'Neill, Adam [3 ]
机构
[1] Microsoft Res, Bengaluru, India
[2] Univ Calif Los Angeles, Ctr Encrypted Funct, Los Angeles, CA 90009 USA
[3] Georgetown Univ, Washington, DC USA
关键词
D O I
10.1007/978-3-662-53890-6_18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-input functional encryption (MIFE) was introduced by Goldwasser et al. (EUROCRYPT 2014) as a compelling extension of functional encryption. In MIFE, a receiver is able to compute a joint function of multiple, independently encrypted plaintexts. Goldwasser et al. ( EUROCRYPT 2014) show various applications of MIFE to running SQL queries over encrypted databases, computing over encrypted data streams, etc. The previous constructions of MIFE due to Goldwasser et al. (EUROCRYPT 2014) based on indistinguishability obfuscation had a major shortcoming: it could only support encrypting an a priori bounded number of message. Once that bound is exceeded, security is no longer guaranteed to hold. In addition, it could only support selective-security, meaning that the challenge messages and the set of "corrupted" encryption keys had to be declared by the adversary up-front. In this work, we show how to remove these restrictions by relying instead on sub-exponentially secure indistinguishability obfuscation. This is done by carefully adapting an alternative MIFE scheme of Goldwasser et al. that previously overcame these shortcomings (except for selective security wrt. the set of "corrupted" encryption keys) by relying instead on differing-inputs obfuscation, which is now seen as an implausible assumption. Our techniques are rather generic, and we hope they are useful in converting other constructions using differing-inputs obfuscation to ones using sub-exponentially secure indistinguishability obfuscation instead.
引用
收藏
页码:531 / 556
页数:26
相关论文
共 50 条
  • [21] (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption
    Bakas, Alexandros
    Michalas, Antonis
    Ullah, Amjad
    SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 111 - 126
  • [22] Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings
    Abdalla, Michel
    Catalano, Dario
    Fiore, Dario
    Gay, Romain
    Ursu, Bogdan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 597 - 627
  • [23] Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors
    Francati, Danilo
    Friolo, Daniele
    Malavolta, Giulio
    Venturi, Daniele
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [24] On bounds for complexity of circuits of multi-input functional elements
    Redkin, N. R.
    DISCRETE MATHEMATICS AND APPLICATIONS, 2010, 20 (01): : 85 - 93
  • [25] A multi-input multi-output functional artificial neural network
    Newcomb, RW
    deFigueiredo, RJP
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 1996, 4 (03) : 207 - 213
  • [26] Minimal unknown-input functional observers for multi-input multi-output LTI systems
    Mohajerpoor, Reza
    Abdi, Hamid
    Nahavandi, Saeid
    JOURNAL OF PROCESS CONTROL, 2015, 35 : 143 - 153
  • [27] Multi-Input SFQ Multiplexers
    Oluwadamilare, Tejumadejesu
    Friedman, Eby G.
    IEEE TRANSACTIONS ON APPLIED SUPERCONDUCTIVITY, 2025, 35 (05)
  • [28] Secure communication based on multi-input multi-output chaotic system with large message amplitude
    Zheng, G.
    Boutat, D.
    Floquet, T.
    Barbot, J. P.
    CHAOS SOLITONS & FRACTALS, 2009, 41 (03) : 1510 - 1517
  • [29] MULTI-INPUT ANALOG COMPARTORS
    EREMEEV, IS
    MEASUREMENT TECHNIQUES-USSR, 1970, (11): : 1713 - &
  • [30] A Novel Design Approach for Multi-input XOR Gate Using Multi-input Majority Function
    Esam Alkaldy
    Keivan Navi
    Fazel Sharifi
    Arabian Journal for Science and Engineering, 2014, 39 : 7923 - 7932