Key-Homomorphic Constrained Pseudorandom Functions

被引:0
|
作者
Banerjee, Abhishek [1 ]
Fuchsbauer, Georg [2 ]
Peikert, Chris [1 ]
Pietrzak, Krzysztof [2 ]
Stevens, Sophie [3 ]
机构
[1] Georgia Inst Technol, Coll Comp, Sch Comp Sci, Atlanta, GA 30332 USA
[2] IST Austria, Klosterneuburg, Austria
[3] Univ Bristol, Bristol, Avon, England
来源
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A pseudorandom function (PRF) is a keyed function F : K x X -> Y where, for a random key k is an element of K, the function F(k, .) is indistinguishable from a uniformly random function, given black-box access. A key-homomorphic PRF has the additional feature that for any keys k, k' and any input x, we have F(k + k', x) = F(k, x) circle plus F(k', x) for some group operations +, circle plus on K and Y, respectively. A constrained PRF for a family of sets S subset of P(X) has the property that, given any key k and set S is an element of S, one can efficiently compute a "constrained" key k(S) that enables evaluation of F(k, x) on all inputs x is an element of S, while the values F(k, x) for x is not an element of S remain pseudorandom even given k(S). In this paper we construct PRFs that are simultaneously constrained and key homomorphic, where the homomorphic property holds even for constrained keys. We first show that the multilinear map-based bit-fixing and circuit-constrained PRFs of Boneh and Waters (Asiacrypt 2013) can be modified to also be key-homomorphic. We then show that the LWE-based key-homomorphic PRFs of Banerjee and Peikert (Crypto 2014) are essentially already prefix-constrained PRFs, using a (non-obvious) definition of constrained keys and associated group operation. Moreover, the constrained keys themselves are pseudorandom, and the constraining and evaluation functions can all be computed in low depth. As an application of key-homomorphic constrained PRFs, we construct a proxy re-encryption scheme with fine-grained access control. This scheme allows storing encrypted data on an untrusted server, where each file can be encrypted relative to some attributes, so that only parties whose constrained keys match the attributes can decrypt. Moreover, the server can re-key (arbitrary subsets of) the ciphertexts without learning anything about the plaintexts, thus permitting efficient and fine-grained revocation.
引用
收藏
页码:31 / 60
页数:30
相关论文
共 50 条
  • [21] Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation
    Datta, Pratish
    Dutta, Ratna
    Mukhopadhyay, Sourav
    ALGORITHMICA, 2019, 81 (09) : 3245 - 3390
  • [22] Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation
    Pratish Datta
    Ratna Dutta
    Sourav Mukhopadhyay
    Algorithmica, 2019, 81 : 3245 - 3390
  • [23] Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property
    Belel, Anushree
    Dutta, Ratna
    Mukhopadhyay, Sourav
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 349 - 356
  • [24] Constrained pseudorandom functions from functional encryption
    Datta, Pratish
    THEORETICAL COMPUTER SCIENCE, 2020, 809 : 137 - 170
  • [25] Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
    David Derler
    Daniel Slamanig
    Designs, Codes and Cryptography, 2019, 87 : 1373 - 1413
  • [26] Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
    Derler, David
    Slamanig, Daniel
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (06) : 1373 - 1413
  • [27] Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
    Davidson, Alex
    Katsumata, Shuichi
    Nishimaki, Ryo
    Yamada, Shota
    Yamakawa, Takashi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 559 - 589
  • [28] Public-Key Watermarking Schemes for Pseudorandom Functions
    Yang, Rupeng
    Yu, Zuoxia
    Au, Man Ho
    Susilo, Willy
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 637 - 667
  • [29] A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
    Kang, Ju-Sung
    Kim, Nayoung
    Ju, Wangho
    Yi, Ok-Yeon
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 10 - 23
  • [30] Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
    Abdalla, Michel
    Benhamouda, Fabrice
    Passelegue, Alain
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 77 - 94