Function-Hiding Inner Product Encryption
نویسندگان
چکیده
We extend the reach of functional encryption schemes that are provably secure under simpleassumptions against unbounded collusion to include function-hiding inner product schemes.Our scheme is a private key functional encryption scheme, where ciphertexts correspond tovectors ~x, secret keys correspond to vectors ~y, and a decryptor learns 〈~x, ~y〉. Our schemeemploys asymmetric bilinear maps and relies only on the SXDH assumption to satisfy a naturalindistinguishability-based security notion where arbitrarily many key and ciphertext vectorscan be simultaneously changed as long as the key-ciphertext dot product relationships are allpreserved.
منابع مشابه
Function-Hiding Inner Product Encryption is Practical
In a functional encryption scheme, secret keys are associated with functions and ciphertexts are associated with messages. Given a secret key for a function f and a ciphertext for a message x, a decryptor learns f(x) and nothing else about x. Inner product encryption is a special case of functional encryption where both secret keys and ciphertexts are associated with vectors. The combination of...
متن کاملMulti-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings
We present new constructions of multi-input functional encryption (MIFE) schemes for the inner-product functionality that improve the state of the art solution of Abdalla et al. (Eurocrypt 2017) in two main directions. First, we put forward a novel methodology to convert single-input functional encryption for inner products into multi-input schemes for the same functionality. Our transformation...
متن کاملTowards Unified, Achievable, Simulation Based Function and Data Privacy in Functional Encryption
As the area of Functional Encryption (FE) has grown in importance, the landscape of its security definitions has become increasingly cluttered. Currently prevalent definitions are largely restricted to data privacy, and are broadly categorized as indistinguishability (IND) style or simulation (SIM) style, where the former are known to be insufficient and the latter are known to be unachievable ...
متن کاملAttribute - Hiding ( Hierarchical ) Inner Product Encryption ∗
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz, Sahai and Waters), while the existing IPE schemes are either fully attribute-hiding but selectively secure or adaptively secure but weakly attribute-hiding. The proposed IPE scheme is proven to be adaptively secure and...
متن کاملFunction Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results
This work furthers the exploration of meaningful definitions for security of Functional Encryption. We propose new simulation based definitions for function privacy in addition to data privacy and study their achievability. In addition, we improve efficiency/ underlying assumptions/ security achieved by existing inner product Functional Encryption and Property Preserving Encryption schemes, in ...
متن کامل