Simulation-Based Secure Functional Encryption in the Random Oracle Model

被引:8
|
作者
Iovino, Vincenzo [1 ]
Zebroski, Karol [2 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
[2] Univ Warsaw, Warsaw, Poland
来源
关键词
Functional encryption; Random oracle model; Simulation-based security; Obfuscation;
D O I
10.1007/978-3-319-22174-8_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the main lines of research in functional encryption (FE) has consisted in studying the security notions for FE and their achievability. This study was initiated by [Boneh et al. TCC'11, O'Neill - ePrint'10] where it was first shown that for FE the indistinguishability-based (IND) security notion is not sufficient in the sense that there are FE schemes that are provably IND-Secure but concretely insecure. For this reason, researchers investigated the achievability of Simulation-based (SIM) security, a stronger notion of security. Unfortunately, the above-mentioned works and others [e.g., Agrawal et al. - CRYPTO' 13] have shown strong impossibility results for SIM-Security. One way to overcome these impossibility results was first suggested in the work of Boneh et al. where it was shown how to construct, in the Random Oracle (RO) model, SIM-Secure FE for restricted functionalities and was asked the generalization to more complex functionalities as a challenging problem in the area. Subsequently, [De Caro et al. CRYPTO' 13] proposed a candidate construction of SIM-Secure FE for all circuits in the RO model assuming the existence of an IND-Secure FE scheme for circuits with RO gates. To our knowledge there are no proposed candidate IND-Secure FE schemes for circuits with RO gates and they seem unlikely to exist. We propose the first constructions of SIM-Secure FE schemes in the RO model that overcome the current impossibility results in different settings. We can do that because we resort to the two following models: In the public-key setting we assume a bound on the number of queries but this bound only affects the running-times of our encryption and decryption procedures. We stress that our FE schemes in thismodel are SIM-Secure and have ciphertexts and tokens of constant-size, whereas in the standard model, the current SIM-Secure FE schemes for general functionalities [De Caro et al., Gorbunov et al. - CRYPTO' 12] have ciphertexts and tokens of size growing as the number of queries. In the symmetric-key setting we assume a timestamp on both ciphertexts and tokens. In this model, we provide FE schemes with short ciphertexts and tokens that are SIM-Secure against adversaries asking an unbounded number of queries. Both results also assume the RO model, but not functionalities with RO gates and rely on extractability obfuscation [Boyle et al. - TCC' 14] (and other standard primitives) secure only in the standard model.
引用
收藏
页码:21 / 39
页数:19
相关论文
共 50 条
  • [1] Secure Identity-Based Encryption in the Quantum Random Oracle Model
    Zhandry, Mark
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 758 - 775
  • [2] Secure identity-based encryption in the quantum random oracle model
    Zhandry, Mark
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2015, 13 (04)
  • [3] On the Achievability of Simulation-Based Security for Functional Encryption
    De Caro, Angelo
    Iovino, Vincenzo
    Jain, Abhishek
    O'Neill, Adam
    Paneth, Omer
    Persiano, Giuseppe
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 519 - 535
  • [4] Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
    Agrawal, Shashank
    Koppula, Venkata
    Waters, Brent
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 659 - 688
  • [5] Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
    Sakai, Yusuke
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 165 - 172
  • [6] Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model
    Yuan, Ke
    Wang, Yahui
    Zeng, Yingming
    Ouyang, Wenlei
    Li, Zheng
    Jia, Chunfu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Efficient functional encryption for inner product with simulation-based security
    Wenbo Liu
    Qiong Huang
    Xinjian Chen
    Hongbo Li
    [J]. Cybersecurity, 4
  • [8] CCA secure type-based proxy re-encryption in the adaptive corruption model without random oracle
    Chang, Yanni
    He, Mingxing
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 293 - 296
  • [9] Efficient functional encryption for inner product with simulation-based security
    Liu, Wenbo
    Huang, Qiong
    Chen, Xinjian
    Li, Hongbo
    [J]. CYBERSECURITY, 2021, 4 (01)
  • [10] Secure Public-Key Encryption from Random Oracle Transformation
    Nishioka, Mototsugu
    Komatsu, Naohisa
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (04) : 1091 - 1105