Author:
Dowerah Uddipana,Dutta Subhranil,Mitrokotsa Aikaterini,Mukherjee Sayantan,Pal Tapas
Abstract
AbstractPredicate inner product functional encryption (P-IPFE) is essentially attribute-based IPFE (AB-IPFE) which additionally hides attributes associated to ciphertexts. In a P-IPFE, a message $${\textbf {x}}$$
x
is encrypted under an attribute $${\textbf {w}}$$
w
and a secret key is generated for a pair $$({\textbf {y}}, {\textbf {v}})$$
(
y
,
v
)
such that recovery of $$\langle {{\textbf {x}}}, {{\textbf {y}}}\rangle $$
⟨
x
,
y
⟩
requires the vectors $${\textbf {w}}, {\textbf {v}}$$
w
,
v
to satisfy a linear relation. We call a P-IPFE unbounded if it can encrypt unbounded length attributes and message vectors. $$\bullet $$
∙
zero predicate IPFE. We construct the first unbounded zero predicate IPFE (UZP-IPFE) which recovers $$\langle {{\textbf {x}}}, {{\textbf {y}}}\rangle $$
⟨
x
,
y
⟩
if $$\langle {{\textbf {w}}}, {{\textbf {v}}}\rangle =0$$
⟨
w
,
v
⟩
=
0
. This construction is inspired by the unbounded IPFE of Tomida and Takashima (ASIACRYPT 2018) and the unbounded zero inner product encryption of Okamoto and Takashima (ASIACRYPT 2012). The UZP-IPFE stands secure against general attackers capable of decrypting the challenge ciphertext. Concretely, it provides full attribute-hiding security in the indistinguishability-based semi-adaptive model under the standard symmetric external Diffie–Hellman assumption. $$\bullet $$
∙
non-zero predicate IPFE. We present the first unbounded non-zero predicate IPFE (UNP-IPFE) that successfully recovers $$\langle {{\textbf {x}}}, {{\textbf {y}}}\rangle $$
⟨
x
,
y
⟩
if $$\langle {{\textbf {w}}}, {{\textbf {v}}}\rangle \ne 0$$
⟨
w
,
v
⟩
≠
0
. We generically transform an unbounded quadratic FE (UQFE) scheme to weak attribute-hiding UNP-IPFE in both public and secret key setting. Interestingly, our secret key simulation secure UNP-IPFE has succinct secret keys and is constructed from a novel succinct UQFE that we build in the random oracle model. We leave the problem of constructing a succinct public key UNP-IPFE or UQFE in the standard model as an important open problem.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference51 articles.
1. M. Abdalla, F. Benhamouda, M. Kohlweiss, H. Waldner, Decentralizing inner-product functional encryption, in D. Lin, K. Sako (eds.) Public-Key Cryptography—PKC 2019, Lecture Notes in Computer Science, vol. 11443 (Springer, 2019), pp. 128–157
2. M. Abdalla, F. Bourse, A.D. Caro, D. Pointcheval, Simple functional encryption schemes for inner products, in J. Katz (ed.) Public-Key Cryptography—PKC 2015, Lecture Notes in Computer Science, vol. 9020 (Springer, 2015), pp. 733–751
3. M. Abdalla, F. Bourse, A. De Caro, D. Pointcheval, Better security for functional encryption for inner product evaluations. Cryptology ePrint Archive (2016). https://eprint.iacr.org/2016/011
4. M. Abdalla, D. Catalano, D. Fiore, R. Gay, B. Ursu, Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings, in H. Shacham, A. Boldyreva (eds.) Advances in Cryptology—CRYPTO 2018, Lecture Notes in Computer Science, vol. 10991 (Springer, 2018), pp. 597–627
5. M. Abdalla, D. Catalano, R. Gay, B. Ursu, Inner-product functional encryption with fine-grained access control, in S. Moriai, H. Wang (eds.) Advances in Cryptology—ASIACRYPT 2020, Lecture Notes in Computer Science, vol. 12493 (Springer, 2020), pp. 467–497
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SACfe: Secure Access Control in Functional Encryption with Unbounded Data;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
2. Unbounded non-zero inner product encryption;Theoretical Computer Science;2024-06