Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits

被引:2
|
作者
Wang, Huige [1 ]
Chen, Kefei [2 ,5 ]
Liu, Joseph K. [3 ]
Hu, Ziyuan [4 ]
机构
[1] Anhui Sci & Technol Univ, Dept Comp, Fengyang 233100, Peoples R China
[2] Hangzhou Normal Univ, Dept Math, Hangzhou 311121, Zhejiang, Peoples R China
[3] Monash Univ, Fac Informat Technol, Melbourne, Vic 3800, Australia
[4] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[5] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Functional encryption; Leakage-resilient chosen-ciphertext; Garbled circuits; PUBLIC-KEY ENCRYPTION; CRYPTOGRAPHY;
D O I
10.1007/978-3-319-99807-7_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At Asiacrypt 2013, Qin and Liu showed a leakage-resilient chosen-ciphertext attacks (LR-CCA) secure public-key encryption (PKE) from one-time lossy filter (OT-LF) and hash proof system (HPS), from which, combining garbled circuits (GC), we present an LR-CCA secure generic construction for single-key and single-ciphertext functional encryption (FE) via hash proof system (HPS) and one-time lossy filter (OT-LF). We bypass known obstacles in realizing leakage-resilient using garbled circuits that make a non-black-box use of the underlying cryptographic primitives. Efficient instantiations of DDH-based and DCR-based HPS and OT-LF indicate that our approach is practical in realizing LR-CCA secure FE scheme under the standard assumptions. Moreover, our constructions from the DDH and DCR assumptions result in the same leakage rate as Qin and Liu's.
引用
收藏
页码:119 / 140
页数:22
相关论文
共 50 条
  • [1] Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
    Qin, Baodong
    Liu, Shengli
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 381 - 400
  • [2] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [3] Efficient chosen-ciphertext secure hybrid encryption scheme tolerating continuous leakage attacks
    Zhou, Yanwei
    Yang, Bo
    Yu, Yong
    Khan, Arshad
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 39 - 47
  • [4] Chosen-Ciphertext Secure Proxy Re-Encryption
    Canetti, Ran
    Hohenberger, Susan
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 185 - 194
  • [5] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Wang, Ting
    Han, Guoqiang
    Yu, Jianping
    Zhang, Peng
    Sun, Xiaoqiang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2973 - 2988
  • [6] Concrete chosen-ciphertext secure encryption from subgroup membership problems
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 1 - +
  • [7] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Ting Wang
    Guoqiang Han
    Jianping Yu
    Peng Zhang
    Xiaoqiang Sun
    [J]. Wireless Personal Communications, 2017, 95 : 2973 - 2988
  • [8] Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
    Yamada, Shota
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Kunihiro, Noboru
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 71 - +
  • [9] Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
    Joo, Chihong
    Yun, Aaram
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 173 - 192
  • [10] Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    Sur, Chul
    Jung, Chae Duk
    Park, Youngho
    Rhee, Kyung Hyune
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 214 - +