Advances in Functional Encryption for Secure Data Handling

From Cryptomania to Obfustopia
through
Secret-Key Functional Encryption
Nir Bitansky
 
Ryo Nishimaki
 
     
Alain Passelègue 
 
  
Daniel Wichs
           (MIT)
  
(NTT)
  
       (ENS)
  
(NEU)
public-key encryption
1
/19
functional encryption
[SW’05]
1
/19
1
/19
the power of
secret-key
functional encryption
 
 
2
 
/19
minicrypt
cryptomania
obfustopia
 
weak PKFE,
restricted PKFE
 
weak SKFE
 
PKFE
SKFE
 
?
 
?
 
?
 
[AJ’15]
[BV’15]
[GPSZ’16]
 
[SS’10]
[GVW’12]
 
[SS’10]
[GPSW’06]
...
3
/19
minicrypt
cryptomania
obfustopia
weak PKFE,
restricted PKFE
weak SKFE
PKFE
SKFE
[AJ’15]
[BV’15]
[GPSZ’16]
evidences
 
[AS’15]
constructions
[SS’10]
[GVW’12]
[SS’10]
[GPSW’06]
...
3
/19
this work
(plain)
public-key encryption
secret-key
functional encryption
 
public-key
functional encryption
 
iO
 
[AJ’15]
[BV’15]
[GPSZ’16]
4
/19
 
SKFE
5
/19
 
?
 
6
 
/19
 
“compression, compression, compression...”
it’s all about the size
 
[BV’15], [AJ’15], [LPST’16], [Lin’16]
7
/19
 
XiO
 
exponentially-efficient iO (XiO)
[
LPST’16
]
8
/19
 
XiO
 
exponentially-efficient iO (XiO)
 
[
LPST’16
]
/19
8
 
1-key succinct PKFE for
Boolean functions
[GKPVZ’13]
/19
9
 
Boolean
function
/19
9
Boolean
function
 
XiO
security follows immediately from that PKFE for Boolean
functions and XiO via standard hybrid gymnastic...
/19
9
 
[LPST’16]
PKFE from XiO + LWE
 
step 1:
XiO from SKFE
 
corollary:
PKFE from SKFE and LWE
two steps
/19
10
[LPST’16] 
PKFE from XiO + LWE
step 1: 
XiO from SKFE
 
main result:
PKFE from SKFE and (plain) PKE
two steps
 
step 2:
(plain) PKE instead of LWE
 
corollary:
PKFE from SKFE and LWE
/19
10
XiO from SKFE
11
/19
XiO from SKFE
11
/19
XiO from SKFE
11
/19
[LPST’16] 
PKFE from XiO + LWE
step 1: 
XiO from SKFE
two steps
corollary:
PKFE from SKFE and LWE
 
1-key succinct PKFE for
Boolean functions
[GKPVZ’13]
 
LWE
12
/19
[LPST’16] 
PKFE from XiO + LWE
step 1: 
XiO from SKFE
two steps
 
corollary:
PKFE from SKFE and LWE
 
1-key succinct PKFE for
Boolean functions
[GKPVZ’13]
 
LWE
 
main result:
PKFE from SKFE and (plain) PKE
12
 
step 2:
1-key succinct PKFE for
Boolean functions
from XiO and (plain) PKE
/19
 
weak PKFE
from PKE
 
[SS’10]
 
less weak PKFE
XiO
construction
 
sufficient
 
[AJ’15],[BV’15]
13
/19
/19
14
/19
14
 
encrypted
labels
/19
14
encrypted
labels
 
input garbler
 
circuit garbler
garbled circuits are decomposable!
/19
14
encrypted
labels
input garbler
circuit garbler
garbled circuits are decomposable!
 
XiO
/19
14
encrypted
labels
input garbler
circuit garbler
garbled circuits are decomposable!
XiO
/19
14
 
if good
enough XiO
 
what about security?
/19
15
want to rely on indistinguishability of decomposable GC
/19
16
/19
17
 
step 1:
XiO from SKFE
two steps
18
 
step 2:
1-key succinct PKFE for
Boolean functions
from XiO and (plain) PKE
 
main result:
PKFE from SKFE and (plain) PKE
/19
 
negative result:
 
[AS’15]
-
no black-box construction from SKFE to PKE
-
even assuming subexponential SKFE...
 
positive result:
 
[this work]
-
PKE from subexponential SKFE and OWF
-
only quasi-polynomially secure
... (not enough for iO)
-
non-black box transform 
[BKS’16]
/19
19
on removing PKE
 
thank you!
Slide Note
Embed
Share

Explore the evolution from Cryptomania to Obfustopia through Secret-Key Functional Encryption, Public-Key Encryption, and the power of Secret-Key Functional Encryption. Discover the significance of different encryption schemes such as Public-Key Functional Encryption, Secret-Key Functional Encryption, and more in ensuring data security and privacy.

  • Functional Encryption
  • Data Security
  • Cryptography
  • Encryption Schemes

Uploaded on Oct 10, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. From Cryptomania to Obfustopia through Secret-Key Functional Encryption Nir Bitansky Ryo Nishimaki Alain Passel gue Daniel Wichs (MIT) (NTT) (ENS) (NEU)

  2. public-key encryption ?????? ??????(?) ?? ? 1/19

  3. functional encryption [SW 05] ?????? ? ?????(?) ??? ??? ?(?) ?(?) = 1/19

  4. secret-key functional encryption [SW 05] ?????? ??????(?) ??? ??? ?(?) ?(?) = - FE:????(???) independent of ? ,#??? - weak FE: grows with either or both 1/19

  5. the power of secret-key functional encryption 2/19

  6. minicrypt cryptomania obfustopia weak PKFE, restricted PKFE weak SKFE PKFE [AJ 15] [BV 15] [GPSZ 16] [SS 10] [GVW 12] [SS 10] [GPSW 06] ... ? ? ? SKFE 3/19

  7. minicrypt cryptomania obfustopia weak PKFE, restricted PKFE weak SKFE PKFE [AJ 15] [BV 15] [GPSZ 16] [SS 10] [GVW 12] [SS 10] [GPSW 06] ... evidences [AS 15] constructions SKFE 3/19

  8. this work iO [AJ 15] [BV 15] [GPSZ 16] public-key functional encryption (plain) secret-key + public-key encryption functional encryption 4/19

  9. 5/19

  10. ? 6/19

  11. its all about the size [BV15], [AJ15], [LPST16], [Lin16] ? compression, compression, compression... 7/19

  12. exponentially-efficient iO (XiO) [LPST 16] ?(0?) ?(1?) XiO ? ? 2? 1 ? ? = poly ? for any ? = (1), XiO + LWE PKFE 8/19

  13. exponentially-efficient iO (XiO) [LPST 16] ?(0?) ?(1?) XiO ? ? 2? 1 ? ? = poly ? for any ? = (1), XiO + LWE PKFE 8 /19

  14. for any ? = (1), XiO + LWE PKFE 1-key succinct PKFE for Boolean functions [GKPVZ 13] 1-key sublinear PKFE for ?/???? [AJ 15],[BV 15] ? ? = ? ?1 ? ? ??? ?????(?) ?1 ? 9 /19

  15. Boolean function ?????? ? ?? ?????(?,?) |???| = |?| 9 /19

  16. Boolean function ?????? ? ?? ???[?] ? ??????,? |???| XiO ???1 ?= ?1 ? security follows immediately from that PKFE for Boolean functions and XiO via standard hybrid gymnastic... 9 /19

  17. two steps [LPST 16] PKFE from XiO + LWE step 1: XiO from SKFE corollary: PKFE from SKFE and LWE 10 /19

  18. two steps [LPST 16] PKFE from XiO + LWE step 1: XiO from SKFE step 2: (plain) PKE instead of LWE main result: corollary: PKFE from SKFE and (plain) PKE PKFE from SKFE and LWE 10 /19

  19. XiO from SKFE ?: 0,1? {0,1} ?: 0,1?/2 0,1?/2 {0,1} ? ? ?(?||?) 2?/2 ?(?) 11 /19

  20. XiO from SKFE ?: 0,1?/2 0,1?/2 {0,1} ? ?????(?) overall size: 2?/2 ???? ? ???( ||?) ? ?(?||?) 11/19

  21. XiO from SKFE ?: 0,1?/2 0,1?/2 {0,1} ?????(?) ?????(?(?||.)) ?????(? (?||.)) ? ? overall size: 2?/2 ???? ? ???( ||?) ???? ?(?||?) ? (?| ? = ?(?||?) ??? = ?(?) 11 /19

  22. two steps [LPST 16] LWE PKFE from XiO + LWE 1-key succinct PKFE for Boolean functions [GKPVZ 13] step 1: XiO from SKFE corollary: PKFE from SKFE and LWE 12/19

  23. two steps [LPST 16] LWE PKFE from XiO + LWE step 2: 1-key succinct PKFE for Boolean functions 1-key succinct PKFE for Boolean functions [GKPVZ 13] from XiO and (plain) PKE step 1: XiO from SKFE corollary: main result: PKFE from SKFE and LWE PKFE from SKFE and (plain) PKE 12 /19

  24. construction [SS 10] less weak PKFE weak PKFE from PKE XiO ?1 ? ????(1) ???? ??? |?| sufficient [AJ 15],[BV 15] 13/19

  25. ? ?(?) ? ? 14 /19

  26. ? ?(?) ? ? ?? ? 14 /19

  27. ?????(?) ??? 0??1 0?1 0?2 1 1 ??1 ?1 ?1 ?2 ??1 0??2 ?2 1 1 ??2 ??2 ~ ? = ? ? ?? ?? 0?? 1 ?? ???0???1 ?? ??? encrypted labels ?? 14 /19

  28. ?????(?) input garbler ??? circuit garbler 0??1 0?1 0?2 1 1 ??1 ?1 ?1 ?2 ??1 0??2 ?2 1 1 ??2 ??2 ~ ? = ? ?? 0?? 1 ?? ???0???1 ?? ??? encrypted labels ?? garbled circuits are decomposable! 14 /19

  29. input garbler circuit garbler 0??1 0?1 0?2 1 1 ??1 ?1 ?2 XiO 0??2 1 1 ??2 ~ ?~ ?? ?? ? ?? ? ?,? ?? ?? 0?? 1 ?? ?? ???0???1 encrypted labels ?? garbled circuits are decomposable! 14 /19

  30. input garbler circuit garbler 0??1 1 ??1 XiO 0??2 1 ?? ??2 ? (?,?) ??? ?~ ? ?? ?? ? ?,? ?? ?? ?? ?? ???0???1 encrypted labels ?? garbled circuits are decomposable! 14 /19

  31. ?????(?) ??? what about security? ?1 ? if good enough XiO built from ?(1)-input SKFE (obtained from 1-input SKFE via [BKS 16]) ? 2?/? ? = ?(1) 1-input SKFE 2-input SKFE 2?/2 ??? 2?/3 ??? 15 /19 2?/3 ??? 2?/2 ???

  32. ?????(?) ?????(? ) ? ??? ??? ? ? = ?(? ) to rely on XiO security: need ???? have ???? ? ??? ? ? ? ??? ? ? ? want to rely on indistinguishability of decomposable GC 16 /19

  33. problem: compressing garbled circuit hybrids related: succinct randomized encodings compress to ????? (or ???? ) [BGLPT 15] too much: ???? |?| ?? |?| other SREs [KLW 15, CH 16, ] not with XIO solution: strategy from adaptive garbled circuits compress to ???? ?????? [HJOSW 16] 17 /19

  34. two steps step 2: 1-key succinct PKFE for Boolean functions from XiO and (plain) PKE step 1: XiO from SKFE main result: PKFE from SKFE and (plain) PKE 18 /19

  35. on removing PKE negative result: [AS 15] - no black-box construction from SKFE to PKE - even assuming subexponential SKFE... positive result: [this work] - PKE from subexponential SKFE and OWF - only quasi-polynomially secure... (not enough for iO) - non-black box transform [BKS 16] 19 /19

  36. thank you!

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#