351 0

A new approach to practical function-private inner product encryption

Title
A new approach to practical function-private inner product encryption
Author
서재홍
Keywords
Functional encryption; Function privacy; Inner product encryption
Issue Date
2019-09
Publisher
ELSEVIER SCIENCE BV
Citation
THEORETICAL COMPUTER SCIENCE, v. 783, Page. 22-40
Abstract
Functional encryption (FE) is a novel paradigm supporting restricted decryption keys for a function f that allow one to learn f(x(j)) from the encryptions of messages x(j). A natural and practical security requirement for FE is to keep not only messages x(1),..., x(q), but also functions f(1),...f(q), excluding inevitable information {f(i)(x(j))}(i,j is an element of[q]), confidential from encryption and decryption keys for any polynomial a priori unknown number q, where f(i) and x(j) are adaptively chosen by adversaries. This security requirement is called full function privacy. In this paper, we focus on function-private FE for inner product functionality in the private key setting (referred to as inner product encryption (IPE)). To the best of our knowledge, only two approaches have been proposed for fully function-private IPE schemes in the private key setting. One is to employ a general transformation from (non-function-private) FE for general circuits (Brakerski and Segev, 2015 [20]). This approach requires computationally intensive cryptography tools, such as indistinguishability obfuscation (for non-function-private FE for general circuits), meaning it is inefficient. The other approach is more practical. It directly constructs an IPE scheme by using dual-pairing vector spaces (DPVS) (Bishop et al., 2015 [21], Datta et al., 2016 [22], and Tomida et al., 2016 [32]). We present a novel approach for practical function-private IPE schemes that does not employ DPVS, but instead uses generalizations of the Brakerski-Segev transformation. Our generalizations of the Brakerski-Segev transformation are easily combinable with existing (non-function-private) IPE schemes, as well as (non-function-private) FE schemes for general circuits on several levels of security. The proposed IPE scheme achieves better performance compared to the schemes proposed by Bishop et al. and Datta et al. The proposed IPE scheme preserves the same security level as previous schemes under the same complexity assumptions. Compared to the scheme proposed by Tomida et al., our scheme has comparable performance in terms of the size of ciphertext and decryption keys, but superior performance in terms of the size of the master key. (C) 2019 Elsevier B.V. All rights reserved.
URI
https://www.sciencedirect.com/science/article/pii/S0304397519301690?via%3Dihubhttps://repository.hanyang.ac.kr/handle/20.500.11754/154089
ISSN
0304-3975; 1879-2294
DOI
10.1016/j.tcs.2019.03.016
Appears in Collections:
COLLEGE OF NATURAL SCIENCES[S](자연과학대학) > MATHEMATICS(수학과) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE