Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation

被引:140
|
作者
Boneh, Dan [1 ]
Zhandry, Mark [1 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
关键词
CONSTANT-SIZE CIPHERTEXTS; BROADCAST ENCRYPTION; HASH FUNCTIONS; SECURE;
D O I
10.1007/978-3-662-44371-2_27
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we show how to use indistinguishability obfuscation (iO) to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy several interesting properties that have not been achievable before: - Our multiparty non-interactive key exchange protocol does not require a trusted setup. Moreover, the size of the published value from each user is independent of the total number of users. - Our broadcast encryption schemes support distributed setup, where users choose their own secret keys rather than be given secret keys by a trusted entity. The broadcast ciphertext size is independent of the number of users. - Our traitor tracing system is fully collusion resistant with short ciphertexts, secret keys, and public key. Ciphertext size is logarithmic in the number of users and secret key size is independent of the number of users. Our public key size is polylogarithmic in the number of users. The recent functional encryption system of Garg, Gentry, Halevi, Raykova, Sahai, and Waters also leads to a traitor tracing scheme with similar ciphertext and secret key size, but the construction in this paper is simpler and more direct. These constructions resolve an open problem relating to differential privacy. - Generalizing our traitor tracing system gives a private broadcast encryption scheme (where broadcast ciphertexts reveal minimal information about the recipient set) with optimal size ciphertext. Several of our proofs of security introduce new tools for proving security using indistinguishability obfuscation.
引用
收藏
页码:480 / 499
页数:20
相关论文
共 27 条
  • [1] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
    Boneh, Dan
    Zhandry, Mark
    [J]. ALGORITHMICA, 2017, 79 (04) : 1233 - 1285
  • [2] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
    Dan Boneh
    Mark Zhandry
    [J]. Algorithmica, 2017, 79 : 1233 - 1285
  • [3] Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation
    Lee, Young Kyung
    Lee, Dong Hoon
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [4] Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
    Khurana, Dakshita
    Rao, Vanishree
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 52 - 75
  • [5] Efficient traitor tracing from collusion secure codes
    Billet, Olivier
    Phan Duong Hieu
    [J]. INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 171 - +
  • [6] Efficient asymmetric public-key traitor tracing without trusted agents
    Watanabe, Y
    Hanaoka, G
    Imai, H
    [J]. TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 392 - 407
  • [7] Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
    Boneh, Dan
    Glass, Darren
    Krashen, Daniel
    Lauter, Kristin
    Sharif, Shahed
    Silverberg, Alice
    Tibouchi, Mehdi
    Zhandry, Mark
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 5 - 14
  • [8] Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation
    Zhang, Yuan
    Xu, Chunxiang
    Liang, Xiaohui
    Li, Hongwei
    Mu, Yi
    Zhang, Xiaojun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 676 - 688
  • [9] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Sun, Lixue
    Xu, Chunxiang
    Zhang, Mingwu
    Chen, Kefei
    Li, Hongwei
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [10] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
    Lixue SUN
    Chunxiang XU
    Mingwu ZHANG
    Kefei CHEN
    Hongwei LI
    [J]. Science China(Information Sciences), 2018, 61 (03) : 228 - 230