On the Achievability of Simulation-Based Security for Functional Encryption

被引:0
|
作者
De Caro, Angelo [1 ]
Iovino, Vincenzo [2 ]
Jain, Abhishek [3 ,4 ]
O'Neill, Adam [4 ]
Paneth, Omer [4 ]
Persiano, Giuseppe [2 ]
机构
[1] NTT Secure Platform Labs, Tokyo, Japan
[2] Univ Salerno, Dipartimento Informat, Fisciano, SA, Italy
[3] MIT, Cambridge, MA 02139 USA
[4] Boston Univ, Boston, MA 02215 USA
关键词
Functional Encryption; Hidden Vector Encryption; Simulation-Based Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work attempts to clarify to what extent simulation-based security (SIM-security) is achievable for functional encryption (FE) and its relation to the weaker indistinguishability-based security (IND-security). Our main result is a compiler that transforms any FE scheme for the general circuit functionality (which we denote by Circuit-FE) meeting indistinguishability-based security (IND-security) to a Circuit-FE scheme meeting SIM-security, where: - In the random oracle model, the resulting scheme is secure for an unbounded number of encryption and key queries, which is the strongest security level one can ask for. - In the standard model, the resulting scheme is secure for a bounded number of encryption and non-adaptive key queries, but an unbounded number of adaptive key queries. This matches known impossibility results and improves upon Gorbunov et al. [CRYPTO'12] (which is only secure for non-adaptive key queries). Our compiler is inspired by the celebrated Fiat-Lapidot-Shamir paradigm [FOCS'90] for obtaining zero-knowledge proof systems from witness-indistinguishable proof systems. As it is currently unknown whether Circuit-FE meeting IND-security exists, the purpose of this result is to establish that it remains a good target for future research despite known deficiencies of IND-security [Boneh et al. - TCC'11, O'Neill - ePrint'10]. We also give a tailored construction of SIM-secure hidden vector encryption (HVE) in composite-order bilinear groups. Finally, we revisit the known negative results for SIM-secure FE, extending them to natural weakenings of the security definition and thus providing essentially a full picture of the (in)achievability of SIM-secure FE.
引用
收藏
页码:519 / 535
页数:17
相关论文
共 50 条
  • [1] Efficient functional encryption for inner product with simulation-based security
    Wenbo Liu
    Qiong Huang
    Xinjian Chen
    Hongbo Li
    [J]. Cybersecurity, 4
  • [2] Efficient functional encryption for inner product with simulation-based security
    Liu, Wenbo
    Huang, Qiong
    Chen, Xinjian
    Li, Hongbo
    [J]. CYBERSECURITY, 2021, 4 (01)
  • [3] Ideal Key Derivation and Encryption in Simulation-Based Security
    Kuesters, Ralf
    Tuengerthal, Max
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 161 - 179
  • [4] Efficient Inner Product Encryption with Simulation-Based Security
    Zhao, Qingsong
    Zeng, Qingkai
    Liu, Ximeng
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 162 - 171
  • [5] Simulation-Based Secure Functional Encryption in the Random Oracle Model
    Iovino, Vincenzo
    Zebroski, Karol
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 21 - 39
  • [6] Simulation-based security of function-hiding inner product encryption
    Zhao, Qingsong
    Zeng, Qingkai
    Liu, Ximeng
    Xu, Huanliang
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (04)
  • [7] Simulation-based security of function-hiding inner product encryption
    Qingsong Zhao
    Qingkai Zeng
    Ximeng Liu
    Huanliang Xu
    [J]. Science China Information Sciences, 2018, 61
  • [8] Simulation-based security of function-hiding inner product encryption
    Qingsong ZHAO
    Qingkai ZENG
    Ximeng LIU
    Huanliang XU
    [J]. Science China(Information Sciences), 2018, 61 (04) : 215 - 225
  • [9] Simulation-Based Bi-Selective Opening Security for Public Key Encryption
    Lai, Junzuo
    Yang, Rupeng
    Huang, Zhengan
    Weng, Jian
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 456 - 482
  • [10] Public-Key Encryption with Tight Simulation-Based Selective-Opening Security
    Lyu, Lin
    Liu, Shengli
    Han, Shuai
    [J]. COMPUTER JOURNAL, 2018, 61 (02): : 288 - 318