Multi-input Functional Encryption with Unbounded-Message Security

被引:4
|
作者
Goyal, Vipul [1 ]
Jain, Aayush [2 ]
O'Neill, Adam [3 ]
机构
[1] Microsoft Res, Bengaluru, India
[2] Univ Calif Los Angeles, Ctr Encrypted Funct, Los Angeles, CA 90009 USA
[3] Georgetown Univ, Washington, DC USA
关键词
D O I
10.1007/978-3-662-53890-6_18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-input functional encryption (MIFE) was introduced by Goldwasser et al. (EUROCRYPT 2014) as a compelling extension of functional encryption. In MIFE, a receiver is able to compute a joint function of multiple, independently encrypted plaintexts. Goldwasser et al. ( EUROCRYPT 2014) show various applications of MIFE to running SQL queries over encrypted databases, computing over encrypted data streams, etc. The previous constructions of MIFE due to Goldwasser et al. (EUROCRYPT 2014) based on indistinguishability obfuscation had a major shortcoming: it could only support encrypting an a priori bounded number of message. Once that bound is exceeded, security is no longer guaranteed to hold. In addition, it could only support selective-security, meaning that the challenge messages and the set of "corrupted" encryption keys had to be declared by the adversary up-front. In this work, we show how to remove these restrictions by relying instead on sub-exponentially secure indistinguishability obfuscation. This is done by carefully adapting an alternative MIFE scheme of Goldwasser et al. that previously overcame these shortcomings (except for selective security wrt. the set of "corrupted" encryption keys) by relying instead on differing-inputs obfuscation, which is now seen as an implausible assumption. Our techniques are rather generic, and we hope they are useful in converting other constructions using differing-inputs obfuscation to ones using sub-exponentially secure indistinguishability obfuscation instead.
引用
收藏
页码:531 / 556
页数:26
相关论文
共 50 条
  • [31] Functional observer design for a class of multi-input and multi-output nonlinear systems
    Cai, Xiushan
    Liu, Yang
    Zhang, Haoran
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2012, 349 (10): : 3046 - 3059
  • [32] A Novel Design Approach for Multi-input XOR Gate Using Multi-input Majority Function
    Alkaldy, Esam
    Navi, Keivan
    Sharifi, Fazel
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (11) : 7923 - 7932
  • [33] Input shaping design for multi-input flexible systems
    Lim, S
    Stevens, HD
    How, JP
    JOURNAL OF DYNAMIC SYSTEMS MEASUREMENT AND CONTROL-TRANSACTIONS OF THE ASME, 1999, 121 (03): : 443 - 447
  • [34] Efficient designs for multi-input counters
    Queen's Univ, Kingston, Canada
    Conf Rec Asilomar Conf Signals Syst Comput, (1340-1344):
  • [35] STUDY OF THE MULTI-INPUT LUT COMPLEXITY
    Tyurin, S. F.
    Grekov, A., V
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2018, (01) : 14 - 21
  • [36] NOTE ON CONTROLLABILITY OF MULTI-INPUT SYSTEMS
    RAMANI, N
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1976, 21 (03) : 431 - 432
  • [37] Multi-input programming of cellular response
    Singh, Arunima
    NATURE METHODS, 2019, 16 (11) : 1080 - 1080
  • [38] Multi-input programming of cellular response
    Arunima Singh
    Nature Methods, 2019, 16 : 1080 - 1080
  • [39] Multi-input strobed analogue comparator
    Opris, IE
    ELECTRONICS LETTERS, 1996, 32 (15) : 1332 - 1334
  • [40] Multi-input Laconic Function Evaluation
    Pang, Bo
    Chen, Long
    Fan, Xiong
    Tang, Qiang
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 369 - 388