Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF

被引:0
|
作者
Pal, Tapas [1 ]
Dutta, Ratna [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Math, Kharagpur, W Bengal, India
关键词
Constrained witness pseudorandom function; Functional encryption; Obfuscation; PUBLIC-KEY ENCRYPTION;
D O I
10.1007/978-3-030-90567-5_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Functional encryption generates sophisticated keys for users so that they can learn specific functions of the encrypted message. We provide a generic construction of chosen ciphertext attacks (CCA) secure public-key functional encryption (PKFE) for all polynomial-size circuits. Our PKFE produces succinct ciphertexts that are independent of the size and depth of the circuit class under consideration. We accomplish our goal in two steps. First, we define a new cryptographic tool called constrained witness pseudorandom function (CWPRF) which is motivated by combining WPRF of Zhandry (TCC 2016) and constrained PRF of Boneh and Waters (ASIACRYPT 2013). More specifically, CWPRF computes pseudorandom values associated with NP statements and generates constrained keys for boolean functions. We can recompute the pseudorandom value corresponding to a particular statement either using a public evaluation key with a valid witness for the statement or applying a constrained key for a function that satisfies the statement. We construct CWPRF by coupling indistinguishability obfuscation (i0) and CPRF supporting all polynomial-size functions. In the second and main technical step, we show a generic construction of a CCA secure PKFE for all circuits utilizing our CWPRF. It has been observed that obtaining PKFE supporting all circuits is already a complex task and i0-based constructions of PKFEs are only proven to be chosen plaintext attacks (CPA) secure. On the other hand, existing CCA secure functional encryption schemes are designed for specific functions such as equality testing, membership testing, linear function etc. We emphasize that our construction presents the first CCA secure PKFE for all circuits along with succinct ciphertexts.
引用
收藏
页码:24 / 45
页数:22
相关论文
共 50 条
  • [1] Practical Chosen Ciphertext Secure Encryption from Factoring
    Hofheinz, Dennis
    Kiltz, Eike
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 313 - 332
  • [2] Practical Chosen Ciphertext Secure Encryption from Factoring
    Dennis Hofheinz
    Eike Kiltz
    Victor Shoup
    [J]. Journal of Cryptology, 2013, 26 : 102 - 118
  • [3] Practical Chosen Ciphertext Secure Encryption from Factoring
    Hofheinz, Dennis
    Kiltz, Eike
    Shoup, Victor
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 102 - 118
  • [4] Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
    Wang, Huige
    Chen, Kefei
    Liu, Joseph K.
    Hu, Ziyuan
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 119 - 140
  • [5] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [6] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Wang, Ting
    Han, Guoqiang
    Yu, Jianping
    Zhang, Peng
    Sun, Xiaoqiang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2973 - 2988
  • [7] Concrete chosen-ciphertext secure encryption from subgroup membership problems
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 1 - +
  • [8] Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 201 - 216
  • [9] Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited
    Mei, Qixiang
    Li, Bao
    Lu, Xianhui
    Jia, Dingding
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 210 - 227
  • [10] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Ting Wang
    Guoqiang Han
    Jianping Yu
    Peng Zhang
    Xiaoqiang Sun
    [J]. Wireless Personal Communications, 2017, 95 : 2973 - 2988