【24h】

Verifiable Functional Encryption

机译:可验证功能加密

获取原文

摘要

In light of security challenges that have emerged in a world with complex networks and cloud computing, the notion of functional encryption has recently emerged. In this work, we show that in several applications of functional encryption (even those cited in the earliest works on functional encryption), the formal notion of functional encryption is actually not sufficient to guarantee security. This is essentially because the case of a malicious authority and/or encryptor is not considered. To address this concern, we put forth the concept of verifiable functional encryption, which captures the basic requirement of output correctness: even if the ciphertext is maliciously generated (and even if the setup and key generation is malicious), the decryptor is still guaranteed a meaningful notion of correctness which we show is crucial in several applications. We formalize the notion of verifiable function encryption and, following prior work in the area, put forth a simulation-based and an indistinguishability-based notion of security. We show that simulation-based verifiable functional encryption is unconditionally impossible even in the most basic setting where there may only be a single key and a single ciphertext. We then give general positive results for the indistin-guishability setting: a general compiler from any functional encryption scheme into a verifiable functional encryption scheme with the only additional assumption being the Decision Linear Assumption over Bilinear Groups (DLIN). We also give a generic compiler in the secret-key setting for functional encryption which maintains both message privacy and function privacy. Our positive results are general and also apply to other simpler settings such as Identity-Based Encryption, Attribute-Based Encryption and Predicate Encryption. We also give an application of verifiable functional encryption to the recently introduced primitive of functional commitments. Finally, in the context of indistinguishability obfuscation, there is a fundamental question of whether the correct program was obfuscated. In particular, the recipient of the obfuscated program needs a guarantee that the program indeed does what it was intended to do. This question turns out to be closely related to verifiable functional encryption. We initiate the study of verifiable obfuscation with a formal definition and construction of verifiable indistinguishability obfuscation.
机译:鉴于具有复杂网络和云计算的世界中出现的安全挑战,最近出现了功能加密的概念。在这项工作中,我们显示在功能加密的几种应用中(即使是那些在最早的功能加密的工作中引用),功能加密的正式概念实际上不足以保证安全性。这基本上是因为不考虑恶意权威和/或加密的情况。为了解决这一问题,我们提出了可验证功能加密的概念,它捕获了输出正确性的基本要求:即使密文是恶意生成的(甚至设置和键生成恶意),解密器仍然保证我们展示的有意义的正确性概念在若干应用中至关重要。我们正规化可验证功能加密的概念,并且在该地区的事先工作之后,提出了基于模拟和基于无法区分的安全性的概念。我们表明,即使在可能只有单键和单个密文的最基本设置中,基于仿真的可验证功能加密也是无条件的不可能的。然后,我们为Indistin-Guishiability设置提供一般的积极结果:从任何功能加密方案到可验证的功能加密方案的一般编译器,其中具有唯一的额外假设是双线性组(DIN)的决策线性假设。我们还在秘密密钥设置中为功能加密提供通用编译器,其维护消息隐私和功能隐私。我们的积极结果是一般的,也适用于其他更简单的设置,例如基于身份的加密,基于属性的加密和谓词加密。我们还向最近引入的功能承诺引入了最近引入的原始的验证功能加密的应用。最后,在无法区分的困难的背景下,有一个基本问题是正确的程序是否被滥用。特别是,混淆计划的接收者需要保证该计划确实做到了它的意图。这个问题结果与可验证的功能加密密切相关。我们通过正式的定义和建设可核实欺凌性混淆来启动验证混淆的研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号