Towards Unified, Achievable, Simulation Based Function and Data Privacy in Functional Encryption

نویسندگان

  • Shweta Agrawal
  • Abishek Kumarasubramanian
  • Amit Sahai
چکیده

As the area of Functional Encryption (FE) has grown in importance, the landscape of its security definitions has become increasingly cluttered. Currently prevalent definitions are largely restricted to data privacy, and are broadly categorized as indistinguishability (IND) style or simulation (SIM) style, where the former are known to be insufficient and the latter are known to be unachievable even for simple functionalities like point functions (IBE) and inner products. Recently, Boneh et al. [BRS13a] introduced a new security definition to study the complementary aspect of function privacy in FE, but it is unclear how this definition relates to data privacy definitions. In this work, we attempt to clean up this state of affairs and present a unified treatment of data and function hiding definitions. We propose a new simulation based definition for function privacy in addition to data privacy, which we call Relax-AD-SIM, and study its achievability. We show that Relax-AD-SIM interpolates simulation based (SIM) and indistinguishability based (IND) definitions for data privacy, and implies the function privacy definition of [BRS13a]. Our definition relaxes the requirements on the simulator to bypass impossibility of SIM in the standard model. We show that the inner product FE scheme of [LOS10] enjoys Relax-AD-SIM security for data hiding while the weaker, selectively secure inner product FE scheme of [KSW08] suffices to achieve function hiding. Our definition provides the first unified simulation based definition that supports function hiding as well as data hiding. We emphasize that Relax-AD-SIM security is the strongest simulation based security definition known to be achievable by inner product FE to the best of our knowledge. This is because Relax-AD-SIM is an adaptive notion of simulation security, which, in its most general form (AD-SIM) is known to be impossible to achieve for inner product FE. ∗I.I.T, Delhi. Email: [email protected]. †UCLA Email: [email protected]. ‡UCLA Email: [email protected]. i.e. it supports post challenge key queries

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014