Affiliation:
1. J.P.Morgan AI Research & AlgoCRYPT CoE
2. Microsoft Research
Abstract
Verifiable encryption (VE) is a protocol where one can provide assurance that an encrypted plaintext satisfies certain properties, or relations. It is an important building block in cryptography with many useful applications, such as key escrow, group signatures, optimistic fair exchange, and others. However, the majority of previous VE schemes are restricted to instantiation with specific public-key encryption schemes or relations. In this work, we propose a novel framework that realizes VE protocols using zero-knowledge proof systems based on the MPC-in-the-head paradigm (Ishai et al. STOC 2007). Our generic compiler can turn a large class of zero-knowledge proofs into secure VE protocols for any secure public-key encryption scheme with the undeniability property, a notion that essentially guarantees binding of encryption when used as a commitment scheme. Our framework is versatile: because the circuit proven by the MPC-in-the-head prover is decoupled from a complex encryption function, the work of the prover is focused on proving the encrypted data satisfies the relation, not the proof of plaintext knowledge. Hence, our approach allows for instantiation with various combinations of properties about the encrypted data and encryption functions. We then consider concrete applications, to demonstrate the efficiency of our framework, by first giving a new approach and implementation to verifiably encrypt discrete logarithms in any prime order group more efficiently than was previously known. Then we give the first practical verifiable encryption scheme for AES keys with post-quantum security, along with an implementation and benchmarks.
Publisher
International Association for Cryptologic Research
Reference74 articles.
1. Verifiable Encryption, Group Encryption, and Their
Applications to Separable Group Signatures and Signature Sharing Schemes;Jan Camenisch,2000
2. Amazon Web Services CloudHSM Documentation: Using the
command line to manage keys,2022
3. Amazon Web Services Key Management Service Documentation:
AWS KMS Keys,2022
4. Microsoft Azure Key Vault Documentation: Key types,
algorithms, and operations,2022
5. Google Cloud Key Management Service Documentation: Key
purposes and algorithms,2022