http://iet.metastore.ingenta.com
1887

Power of public-key function-private functional encryption

Power of public-key function-private functional encryption

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In the public-key setting, known constructions of function-private functional encryption (FPFE) were limited to very restricted classes of functionalities like inner-product. Moreover, its power has not been well investigated. The authors construct FPFE for general functions and explore its powerful applications, both for general and specific functionalities. One key observation entailed by their results is that attribute-based encryption with function privacy implies FE, a notable fact that sheds light on the importance of the function privacy property for FE.

References

    1. 1)
      • D. Boneh , A. Sahai , B. Waters .
        1. Boneh, D., Sahai, A., Waters, B.: ‘Functional encryption: definitions and challenges’. TCC 2011: 8th Theory of Cryptography Conf., Providence, RI, USA, March 28–30 2011 (LNCS, 6597), pp. 253273.
        . TCC 2011: 8th Theory of Cryptography Conf., Providence , 253 - 273
    2. 2)
      • D. Boneh , G. Di Crescenzo , R. Ostrovsky .
        2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., et al: ‘Public key encryption with keyword search’. Advances in Cryptology – EUROCRYPT 2004, Interlaken, Switzerland, May 2–6, 2004 (LNCS, 3027), pp. 506522.
        . Advances in Cryptology – EUROCRYPT 2004 , 506 - 522
    3. 3)
      • D. Boneh , B. Waters .
        3. Boneh, D., Waters, B.: ‘Conjunctive, subset, and range queries on encrypted data’. TCC 2007: 4th Theory of Cryptography Conf., Amsterdam, The Netherlands, February 21–24 2007 (LNCS, 4392), pp. 535554.
        . TCC 2007: 4th Theory of Cryptography Conf. , 535 - 554
    4. 4)
      • J. Katz , A. Sahai , B. Waters .
        4. Katz, J., Sahai, A., Waters, B.: ‘Predicate encryption supporting disjunctions, polynomial equations, and inner products’. Advances in Cryptology – EUROCRYPT 2008, Istanbul, Turkey, April 13–17 2008 (LNCS, 4965), pp. 146162.
        . Advances in Cryptology – EUROCRYPT 2008 , 146 - 162
    5. 5)
      • S. Garg , C. Gentry , S. Halevi .
        5. Garg, S., Gentry, C., Halevi, S., et al: ‘Candidate indistinguishability obfuscation and functional encryption for all circuits’. 54th Annual IEEE Symp. Foundations of Computer Science, FOCS 2013 IEEE Computer Society, 2013, Berkeley, CA, USA, 26–29 October 2013, pp. 4049.
        . 54th Annual IEEE Symp. Foundations of Computer Science, FOCS 2013 IEEE Computer Society, 2013 , 40 - 49
    6. 6)
      • E. Shen , E. Shi , B. Waters .
        6. Shen, E., Shi, E., Waters, B.: ‘Predicate privacy in encryption systems’. TCC 2009: 6th Theory of Cryptography Conf., March 15–17 2009 (LNCS, 5444), pp. 457473.
        . TCC 2009: 6th Theory of Cryptography Conf. , 457 - 473
    7. 7)
      • Z. Brakerski , G. Segev .
        7. Brakerski, Z., Segev, G.: ‘Function-private functional encryption in the private-key setting’. Theory of Cryptography – 12th Theory of Cryptography Conf., TCC 2015, Proc., Part II, Warsaw, Poland, March 23–25 2015, pp. 306324.
        . Theory of Cryptography – 12th Theory of Cryptography Conf., TCC 2015, Proc., Part II , 306 - 324
    8. 8)
      • D. Boneh , A. Raghunathan , G. Segev .
        8. Boneh, D., Raghunathan, A., Segev, G.: ‘Function-private identity-based encryption: hiding the function in functional encryption’. Advances in Cryptology – CRYPTO 2013 – 33rd Annual Cryptology Conf. Proc., Part II, Santa Barbara, CA, USA, August 18–22 2013 (LNCS, 8043), pp. 461478.
        . Advances in Cryptology – CRYPTO 2013 – 33rd Annual Cryptology Conf. Proc., Part II , 461 - 478
    9. 9)
      • D. Boneh , A. Raghunathan , G. Segev .
        9. Boneh, D., Raghunathan, A., Segev, G.: ‘Function-private subspace-membership encryption and its applications’. Advances in Cryptology – ASIACRYPT 2013 – 19th Int. Conf. Theory and Application of Cryptology and Information Security, Proc., Part I, Bengaluru, India, December 1–5 2013, pp. 255275.
        . Advances in Cryptology – ASIACRYPT 2013 – 19th Int. Conf. Theory and Application of Cryptology and Information Security, Proc., Part I , 255 - 275
    10. 10)
      • S. Agrawal , S. Agrawal , S. Badrinarayanan .
        10. Agrawal, S., Agrawal, S., Badrinarayanan, S., et al: ‘On the practical security of inner product functional encryption’. Proc. Public-Key Cryptography – PKC 2015 – 18th IACR Int. Conf. Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30–April 1 2015, pp. 777798.
        . Proc. Public-Key Cryptography – PKC 2015 – 18th IACR Int. Conf. Practice and Theory in Public-Key Cryptography , 777 - 798
    11. 11)
      • N. Bitansky , R. Canetti , Y.T. Kalai .
        11. Bitansky, N., Canetti, R., Kalai, Y.T., et al: ‘On virtual grey box obfuscation for general circuits’. Advances in Cryptology – CRYPTO 2014 – 34th Annual Cryptology Conf., Proc., Part II, Santa Barbara, CA, USA, August 17–21 2014, pp. 108125.
        . Advances in Cryptology – CRYPTO 2014 – 34th Annual Cryptology Conf., Proc., Part II , 108 - 125
    12. 12)
      • M. Bellare , I. Stepanovs , S. Tessaro .
        12. Bellare, M., Stepanovs, I., Tessaro, S.: ‘Contention in cryptoland: obfuscation, leakage and UCE’. Theory of Cryptography – 13th Int. Conf., TCC 2016-A, Proc., Part II, Tel Aviv, Israel, January 10–13 2016, pp. 542564.
        . Theory of Cryptography – 13th Int. Conf., TCC 2016-A, Proc., Part II , 542 - 564
    13. 13)
      • S. Goldwasser , S. Dov Gordon , V. Goyal .
        13. Goldwasser, S., Dov Gordon, S., Goyal, V., et al: ‘Multi-input functional encryption’. Advances in Cryptology – EUROCRYPT 2014 – 33rd Annual Int. Conf. Theory and Applications of Cryptographic Techniques Proc., Copenhagen, Denmark, May 11–15 2014 (LNCS, 8441), pp. 578602.
        . Advances in Cryptology – EUROCRYPT 2014 – 33rd Annual Int. Conf. Theory and Applications of Cryptographic Techniques Proc. , 578 - 602
    14. 14)
      • D. Boneh , M.K. Franklin .
        14. Boneh, D., Franklin, M.K.: ‘Identity-based encryption from the Weil pairing’. Advances in Cryptology – CRYPTO 2001, Santa Barbara, CA, USA, August 19–23 2001 (LNCS, 2139), pp. 213229.
        . Advances in Cryptology – CRYPTO 2001 , 213 - 229
    15. 15)
      • V. Goyal , O. Pandey , A. Sahai .
        15. Goyal, V., Pandey, O., Sahai, A., et al: ‘Attribute-based encryption for fine-grained access control of encrypted data’. ACM CCS 06: 13th Conf. Computer and Communications Security, Alexandria, Virginia, USA, October 30 – November 3 2006, pp. 8998, Available as Cryptology ePrint Archive Report 2006/309.
        . ACM CCS 06: 13th Conf. Computer and Communications Security , 89 - 98
    16. 16)
      • E. Boyle , S. Goldwasser , I. Ivan .
        16. Boyle, E., Goldwasser, S., Ivan, I.: ‘Functional signatures and pseudorandom functions’. Public-Key Cryptography - PKC 2014 - 17th Int. Conf. Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26–28 2014, pp. 501519.
        . Public-Key Cryptography - PKC 2014 - 17th Int. Conf. Practice and Theory in Public-Key Cryptography , 501 - 519
    17. 17)
      • R. Canetti .
        17. Canetti, R.: ‘Towards real ng random oracles: hash functions that hide all partial information’. Advances in Cryptology – CRYPTO'97, Santa Barbara, CA, USA, August 17–21 1997 (LNCS, 1294), pp. 455469.
        . Advances in Cryptology – CRYPTO'97 , 455 - 469
    18. 18)
      • A.W. Dent , M. Fischlin , M. Manulis .
        18. Dent, A.W., Fischlin, M., Manulis, M., et al: ‘Confidential signatures and deterministic signcryption’. PKC 2010: 13th Int. Conf. Theory and Practice of Public Key Cryptography, Paris, France, May 26–28 2010 (LNCS, 6056), pp. 462479.
        . PKC 2010: 13th Int. Conf. Theory and Practice of Public Key Cryptography , 462 - 479
    19. 19)
      • V. Goyal , A. Jain , V. Koppula .
        19. Goyal, V., Jain, A., Koppula, V., et al: ‘Functional encryption for randomized functionalities’. Theory of Cryptography – 12th Theory of Cryptography Conf., TCC 2015, Proc., Part II, Warsaw, Poland, March 23–25 2015, pp. 325351.
        . Theory of Cryptography – 12th Theory of Cryptography Conf., TCC 2015, Proc., Part II , 325 - 351
    20. 20)
      • T. Okamoto , K. Takashima .
        20. Okamoto, T., Takashima, K.: ‘Adaptively attribute-hiding (hierarchical) inner product encryption’. Advances in Cryptology – EUROCRYPT 2012, Cambridge, UK, April 15–19 2012 (LNCS, 7237), pp. 591608.
        . Advances in Cryptology – EUROCRYPT 2012 , 591 - 608
    21. 21)
      • S. Agrawal , D.M. Freeman , V. Vaikuntanathan .
        21. Agrawal, S., Freeman, D.M., Vaikuntanathan, V.: ‘Functional encryption for inner product predicates from learning with errors’. Advances in Cryptology – ASIACRYPT 2011, Seoul, South Korea, December 4–8 2011 (LNCS, 7073), pp. 2140.
        . Advances in Cryptology – ASIACRYPT 2011 , 21 - 40
    22. 22)
      • S. Agrawal , S. Agrawal , S. Badrinarayanan .
        22. Agrawal, S., Agrawal, S., Badrinarayanan, S., et al: ‘Function private functional encryption and property preserving encryption: new definitions and positive results’, Cryptology ePrint Archive, 2013. http://eprint.iacr.org/2013/744.
        .
    23. 23)
      • A. Sahai , B. Waters .
        23. Sahai, A., Waters, B.: ‘How to use indistinguishability obfuscation: deniable encryption, and more’. Symp. Theory of Computing Conf., STOC'14, New York, NY, USA, 31 May-3 June 2014, pp. 475484.
        . Symp. Theory of Computing Conf., STOC'14 , 475 - 484
    24. 24)
      • N. Bitansky , R. Canetti , Y.T. Kalai .
        24. Bitansky, N., Canetti, R., Kalai, Y.T., et al: ‘On virtual grey box obfuscation for general circuits’. IACR Cryptology ePrint Archive, 2014. http://eprint.iacr.org/2014/554/20140805:181558. Note that we refer to the version posted on 14 August 2014.
        .
    25. 25)
      • I. Komargodski , G. Segev , E. Yogev .
        25. Komargodski, I., Segev, G., Yogev, E.: ‘Functional encryption for randomized functionalities in the private-key setting from minimal assumptions’. Theory of Cryptography – 12th Theory of Cryptography Conf., TCC 2015, Proc., Part II, Warsaw, Poland, March 23–25 2015, pp. 352377.
        . Theory of Cryptography – 12th Theory of Cryptography Conf., TCC 2015, Proc., Part II , 352 - 377
    26. 26)
      • B. Waters .
        26. Waters, B.: ‘A punctured programming approach to adaptively secure functional encryption’. Advances in Cryptology – CRYPTO 2015 – 35th Annual Cryptology Conf., Proc., Part II, Santa Barbara, CA, USA, August 16–20 2015, pp. 678697.
        . Advances in Cryptology – CRYPTO 2015 – 35th Annual Cryptology Conf., Proc., Part II , 678 - 697
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2016.0459
Loading

Related content

content/journals/10.1049/iet-ifs.2016.0459
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address