Functional Encryption & Property Preserving Encryption

Slides:



Advertisements
Similar presentations
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko Tatsuaki Okamoto Amit Sahai The.
Advertisements

Efficient Lattice (H)IBE in the standard model Shweta Agrawal, Dan Boneh, Xavier Boyen.
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Perfect Non-interactive Zero-Knowledge for NP
Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
Adaptively Attribute-Hiding ( Hierarchical ) Inner Product Encryption
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
EXPLICIT NON-MALLEABLE CODES RESISTANT TO PERMUTATIONS Shashank Agrawal (UIUC), Divya Gupta (UCLA), Hemanta Maji (UCLA), Omkant Pandey (UIUC), Manoj Prabhakaran.
Allison Lewko TexPoint fonts used in EMF.
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs.
1. Breaking the Adaptivity Barrier for Deterministic Public-Key Encryption Ananth Raghunathan (joint work with Gil Segev and Salil Vadhan)
Trusted 3rd parties Basic key exchange
Off-the-Record Communication, or, Why Not To Use PGP
Controlled Functional Encryption Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter.
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Anonymity-preserving Public-Key Encryption Markulf Kohlweiss Ueli Maurer, Cristina Onete, Björn Tackmann, and Daniele Venturi PETS 2013.
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
A Rate-Optimizing Compiler for Non- malleable Codes against Bit-wise Tampering and Permutations Shashank Agrawal (UIUC), Divya Gupta (UCLA), Hemanta K.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Encryption Public-Key, Identity-Based, Attribute-Based.
Dual System Encryption: Concept, History and Recent works Jongkil Kim.
On the Practical Security of Inner Product Functional Encryption Shashank Agrawal (UIUC), Shweta Agrawal (IIT Delhi), Saikrishna Badrinarayanan (UCLA),
Cryptography The science of writing in secret code.
S EMANTICALLY - SECURE FUNCTIONAL ENCRYPTION : P OSSIBILITY RESULTS, IMPOSSIBILITY RESULTS AND THE QUEST FOR A GENERAL DEFINITION Adam O’Neill, Georgetown.
Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.
TAMPER DETECTION AND NON-MALLEABLE CODES Daniel Wichs (Northeastern U)
1 Adaptive Witness Encryption and Asymmetric Password-based Cryptography PKC 2015 March 31, 2015 Mihir Bellare UC San Diego Viet Tung Hoang University.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Author: Stanislaw Jarecki and Xiaomin Liu University of California, Irvine From:
A Brief History of Provable Security and PKE Alex Dent Information Security Group Royal Holloway, University of London.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Ciphertext-Policy, Attribute-Based Encryption Brent Waters SRI International John Bethencourt CMU Amit Sahai UCLA.
1 Cross-Domain Secure Computation Chongwon Cho (HRL Laboratories) Sanjam Garg (IBM T.J. Watson) Rafail Ostrovsky (UCLA)
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Adaptively Secure Broadcast, Revisited
Functional Encryption: An Introduction and Survey Brent Waters.
(Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min Goi
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Review of Certificateless Cryptography Yu-Chi Chen.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Succinct Functional Encryption: d Reusable Garbled Circuits and Beyond
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
Polynomially Homomorphic Signatures Dan Boneh Stanford University Joint work with David Freeman.
On Simulation-Sound Trapdoor Commitments Phil MacKenzie, Bell Labs Ke Yang, CMU.
Attribute-Based Encryption With Verifiable Outsourced Decryption.
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Homework #2 J. H. Wang Oct. 31, 2012.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Boneh-Franklin Identity Based Encryption Scheme
Group theory exercise.
Modern symmetric-key Encryption
Semantic Security and Indistinguishability in the Quantum World
Verifiable Oblivious Storage
Cryptography for Quantum Computers
Cryptography Lecture 25.
Rishab Goyal Venkata Koppula Brent Waters
Functional Encryption: An Introduction and Survey
Cryptography Lecture 21.
Compact Adaptively Secure ABE for NC1 from k-Lin
Presentation transcript:

Functional Encryption & Property Preserving Encryption Shashank Agrawal (UIUC), Shweta Agrawal (IIT-D), Saikrishna Badrinarayanan (IIT-M), Abisekh Kumarasubramanian (UCLA), Manoj Prabhakaran (UIUC), Amit Sahai (UCLA).

Outline Various encryption schemes: Public-key functional encryption, Private-key functional encryption, Property Preserving encryption. Fairly new ideas, spend some time on each one. What they are? Our results. Come back and discuss Public-key functional encryption in detail.

Public key Functional enc. MPK 𝑚∈𝑀 ENC (m) MSK, MPK MPK Alice Note that there are two parameters – message space, and the more important one, the function family – the more . Providing function hiding is not easy in this setting. Bob 𝑓∈𝐹 MPK Trusted Authority 𝑆 𝐾 𝑓 DEC ( ENC(m),𝑆 𝐾 𝑓 ) = f(m) Julie

Public key Functional enc. First formally studied by Boneh, Sahai and Waters in 2011. Encompasses well-known notions of encryption: Public-key encryption [DH76, RSA77, …], Identity-based encryption [Sha84, BF01, Coc01, BW06, GPV08], Attribute-based encryption [SW05, GPSW06, GVW13, GGH+13], Predicate encryption [KSW08, LOS+10, AFV11], Searchable encryption [BCOP04], etc . Has been the subject of intense study in the recent past.

Our contribution A new definition for Functional Encryption: Simulation based (real-ideal world), Provides both function and message hiding, Simple and intuitive. First definition with the above features. Construct a secure protocol in the generic group model. Practice: Security against a large class of attacks. Function family F: inner-product predicates. A weaker simulation-based definition that can be realized under a weaker assumption.

Private key functional Enc. 𝑚1, 𝑚2, 𝑚3∈𝑀 ENC (m1, SK) SK ENC (m2, SK) ENC (m3, SK) 𝑆 𝐾 𝑓 for an 𝑓∈𝐹 Client could be backing up files on the server. Later the client wants to access files which contain a particular keyword. 𝑓 𝑚1 , 𝑓 𝑚2 , 𝑓(𝑚3) Client Server

USE CASE Client stores files on server by encrypting them. Later the client wants all files with the keyword ‘urgent’. Client sends a key 𝑆𝐾 𝑢𝑟𝑔𝑒𝑛𝑡 to the server. Server applies decryption function to each file. Returns files for which output is 1 to the client. Dec ( 𝑆𝐾 𝑢𝑟𝑔𝑒𝑛𝑡 , Enc. file) = 1 iff file contains the word ‘urgent’.

Private key functional Enc. First studied by Shen, Shi and Waters in 2009 [SSW09]. SSW09 construct a secure protocol for inner-product predicates. A new protocol that is better in several ways.

An improved protocol SSW09 protocol Our protocol Selective security Full security Composite-order groups Prime-order groups Non-standard assumptions Standard assumption

Our protocol Derived from Okamoto and Takashima [OT12]. Symmetric nature of inner-product predicates. Ways to transform a protocol with weaker properties into one with stronger properties [Fre10, Lew12]. No method can simultaneously solve all the three problems.

Property preserving encryption :𝑀×𝑀→{0,1} TEST(ENC(m1), ENC(m2)) = P(m1, m2) SK ENC (m1, SK) ENC (m2, SK) Client Server

USE case Property: Given two files, which one comes before in alphabetical order. Client stores files on server by encrypting them. Later client wants to retrieve the file which comes first in alphabetical order. Server uses 𝑇𝐸𝑆𝑇 to compare encrypted files. Sorts the files in alphabetical order.

Property preserving encryption Introduced by Pandey and Rouselakis in 2012 [PR12]. PR12 gives a protocol for the inner-product property. We improve their protocol in two crucial ways. Exploit connection b/n Private-key FE and PPE. PR12 Our protocol Composite-order groups Prime order groups Generic group model Standard model (DLIN assumption)

Public-key functional encryption

Alice 𝑓∈𝐹 MPK 𝑚∈𝑀 ENC (m, MPK) MSK, MPK MPK Adversary MPK 𝑆 𝐾 𝑓 Trusted Authority 𝑆 𝐾 𝑓 DEC ( ENC(m),𝑆 𝐾 𝑓 ) = f(m) Julie

Indistinguishability based def. Message hiding: 𝑚 1 and 𝑚 2 s.t. 𝑓( 𝑚 1 ) = 𝑓( 𝑚 2 ). 𝐸𝑛𝑐( 𝑚 1 ) indistinguishable from 𝐸𝑛𝑐( 𝑚 2 ). Function hiding: 𝑓1 and 𝑓2 s.t. 𝑓1(𝑚) = 𝑓2(𝑚). 𝑆 𝐾 𝑓1 indistinguishable from 𝑆 𝐾 𝑓2 . By creating 𝐸𝑛𝑐( 𝑚 1 ), 𝐸𝑛𝑐 𝑚 2 , 𝐸𝑛𝑐( 𝑚 3 ),… compute 𝑓1 𝑚 1 , 𝑓1 𝑚 2 , 𝑓1( 𝑚 3 ) or 𝑓2 𝑚 1 , 𝑓2 𝑚 2 , 𝑓2 𝑚 3 . Could distinguish between 𝑓1 and 𝑓2. Intuitively, given 𝐸𝑛𝑐(𝑚) and SK for 𝑓, the only information Bob learns is 𝑓(𝑚).

Simulation based def. A new definition for Functional Encryption: Simulation based (real-ideal world), Provides both function and message hiding, Simple and intuitive. Real world execution of a protocol is compared with an “Ideal” world. Ideal world: Security requirements we want from our protocol.

Real World Ideal World MSK, MPK MPK Environment Environment 𝑚 1 , 𝑚 2 ,…, 𝑚 𝑖−1 , 𝑚 𝑖 MSK, MPK 𝑓 1 , 𝑓 2 ,…, 𝑓 𝑘−1 ,𝑓 𝑘 MPK 𝐸𝑛𝑐 ( 𝑚 1 ) 𝑓 1 𝑚 1 , 𝑓 2 𝑚 2 , …, 𝑓 𝑘−1 ( 𝑚 𝑖 ) …, 𝐸𝑛𝑐( 𝑚 𝑖 ) 𝑓 𝑘 𝑚 1 , 𝑓 𝑘 𝑚 2 , …, 𝑓 𝑘 ( 𝑚 𝑖 ) 𝑆 𝐾 𝑓 1 …,𝑆 𝐾 𝑓 𝑘 Trusted Authority Adversary Oracle Simulator 𝑓 1 …,𝑓 𝑘 𝑓 𝑘 ∈𝐹 𝑚 1 …, 𝑚 𝑖 𝑚 𝑖 ∈𝑀 Environment Environment ∀ 𝐴𝑑𝑣 ∃ 𝑆𝑖𝑚 𝑅𝑒𝑎𝑙≈𝐼𝑑𝑒𝑎𝑙

Our set-up Strong security definition. Cannot be realized in the standard model [BSW11, O’N11, BO12]. Adversary doesn’t exploit structure of the group. Generic group model: captures most real-world attacks. Function family F: inner product predicates. Looking at some special cases of Functional Encryption. Inner-product predicates capture those cases.

Identity based encryption ID = {Bob, Alice, Mary, …} and 𝑆={ 𝑚 1 , 𝑚 2 , 𝑚 3 ,…}. 𝐹= 𝑓 𝑖𝑑 𝑖𝑑∈𝐼𝐷}. 𝑀={(𝑚,𝑖 𝑑 ′ )|𝑚∈𝑆, 𝑖 𝑑 ′ ∈𝐼𝐷}. 𝑓 𝑖𝑑 𝑚, 𝑖 𝑑 ′ =𝑚 if 𝑖𝑑=𝑖𝑑′, and ⊥ otherwise. Authority gives secret key according to id Ex: Alice gets a SK for 𝑓 𝐴𝑙𝑖𝑐𝑒 Bob sends 𝐸𝑛𝑐( 𝑚 ∗ , 𝐴𝑙𝑖𝑐𝑒) to Alice. Only Alice can obtain 𝑚 ∗ , using SK for 𝑓 𝐴𝑙𝑖𝑐𝑒 .

Complex policies Complex policies like Head of Dept. OR (Faculty AND Security). 𝐼 𝐷 𝑝𝑜𝑠 ={𝐻𝑒𝑎𝑑 𝑜𝑓 𝐷𝑒𝑝𝑡., 𝐹𝑎𝑐𝑢𝑙𝑡𝑦, 𝑆𝑡𝑢𝑑𝑒𝑛𝑡𝑠, …} 𝐼 𝐷 𝑎𝑟𝑒𝑎 ={𝑆𝑒𝑐𝑢𝑟𝑖𝑡𝑦,𝐴𝑙𝑔𝑜𝑟𝑖𝑡ℎ𝑚𝑠, 𝐴𝐼,…} 𝐵𝐸𝑥𝑝= 𝐵𝑜𝑜𝑙𝑒𝑎𝑛 𝑒𝑥𝑝𝑟𝑒𝑠𝑠𝑖𝑜𝑛𝑠 𝑜𝑣𝑒𝑟 𝐼 𝐷 𝑝𝑜𝑠 𝑎𝑛𝑑 𝐼 𝐷 𝑎𝑟𝑒𝑎 𝐹= 𝑓 𝑖𝑑1, 𝑖𝑑2 𝑖𝑑1∈𝐼 𝐷 𝑝𝑜𝑠 , 𝑖𝑑2∈𝐼 𝐷 𝑎𝑟𝑒𝑎 } 𝑀= 𝑚, 𝑏𝑒𝑥𝑝 𝑚∈𝑆, 𝑏𝑒𝑥𝑝∈𝐵𝑒𝑥𝑝} 𝑓 𝑖𝑑1, 𝑖𝑑2 𝑚, 𝑏𝑒𝑥𝑝 =𝑚 iff 𝐼 𝐷 1 and 𝐼 𝐷 2 satisfy the Boolean Expression 𝑏𝑒𝑥𝑝.

Inner-product Predicates Powerful primitive: Identity Based Encryption Complex Policies like Boolean Expressions 𝐹= 𝑓 𝑣 𝑣 =( 𝑣 1 , 𝑣 2 ,…, 𝑣 𝑛 )}. 𝑀= 𝑚, 𝑥 𝑥 =( 𝑥 1 , 𝑥 2 ,…, 𝑥 𝑛 )}. 𝑓 𝑣 𝑚, 𝑥 =𝑚 if 𝑣 . 𝑥 =∑ 𝑣 𝑖 . 𝑥 𝑖 =0, and ⊥ otherwise. Given a key for 𝑓 𝑣 we would be able to recover 𝑚 from an encryption (𝑚, 𝑥 ) only if 𝑣 . 𝑥 =0.

Our protocol A protocol for inner-product predicates in the Generic group model, which is secure under a strong simulation- based definition. Two constructions Dual Pairing Vector Spaces (Okamoto and Takashima in 2008). Secret Sharing. The constructions have comparable efficiency. For vectors of length n, ciphertext and key of length 3n.

Conclusion A new powerful definition for Public-Key Functional Encryption. Protocol in the Generic group model. Another definition Relax-SIM. Protocol in the standard model. Improve protocols for Private-Key Functional Encryption and Property Preserving Encryption in various ways. First protocols under standard assumptions/model.

Thank You Paper will soon be available on Eprint.