Download presentation
Presentation is loading. Please wait.
Published byDamion Hinsley Modified over 10 years ago
1
Functional Encryption & Property Preserving Encryption
Shashank Agrawal (UIUC), Shweta Agrawal (IIT-D), Saikrishna Badrinarayanan (IIT-M), Abisekh Kumarasubramanian (UCLA), Manoj Prabhakaran (UIUC), Amit Sahai (UCLA).
2
Outline Various encryption schemes:
Public-key functional encryption, Private-key functional encryption, Property Preserving encryption. Fairly new ideas, spend some time on each one. What they are? Our results. Come back and discuss Public-key functional encryption in detail.
3
Public key Functional enc.
MPK πβπ ENC (m) MSK, MPK MPK Alice Note that there are two parameters β message space, and the more important one, the function family β the more . Providing function hiding is not easy in this setting. Bob πβπΉ MPK Trusted Authority π πΎ π DEC ( ENC(m),π πΎ π ) = f(m) Julie
4
Public key Functional enc.
First formally studied by Boneh, Sahai and Waters in Encompasses well-known notions of encryption: Public-key encryption [DH76, RSA77, β¦], Identity-based encryption [Sha84, BF01, Coc01, BW06, GPV08], Attribute-based encryption [SW05, GPSW06, GVW13, GGH+13], Predicate encryption [KSW08, LOS+10, AFV11], Searchable encryption [BCOP04], etc . Has been the subject of intense study in the recent past.
5
Our contribution A new definition for Functional Encryption:
Simulation based (real-ideal world), Provides both function and message hiding, Simple and intuitive. First definition with the above features. Construct a secure protocol in the generic group model. Practice: Security against a large class of attacks. Function family F: inner-product predicates. A weaker simulation-based definition that can be realized under a weaker assumption.
6
Private key functional Enc.
π1, π2, π3βπ ENC (m1, SK) SK ENC (m2, SK) ENC (m3, SK) π πΎ π for an πβπΉ Client could be backing up files on the server. Later the client wants to access files which contain a particular keyword. π π1 , π π2 , π(π3) Client Server
7
USE CASE Client stores files on server by encrypting them.
Later the client wants all files with the keyword βurgentβ. Client sends a key ππΎ π’πππππ‘ to the server. Server applies decryption function to each file. Returns files for which output is 1 to the client. Dec ( ππΎ π’πππππ‘ , Enc. file) = 1 iff file contains the word βurgentβ.
8
Private key functional Enc.
First studied by Shen, Shi and Waters in [SSW09]. SSW09 construct a secure protocol for inner-product predicates. A new protocol that is better in several ways.
9
An improved protocol SSW09 protocol Our protocol Selective security
Full security Composite-order groups Prime-order groups Non-standard assumptions Standard assumption
10
Our protocol Derived from Okamoto and Takashima [OT12].
Symmetric nature of inner-product predicates. Ways to transform a protocol with weaker properties into one with stronger properties [Fre10, Lew12]. No method can simultaneously solve all the three problems.
11
Property preserving encryption
:πΓπβ{0,1} TEST(ENC(m1), ENC(m2)) = P(m1, m2) SK ENC (m1, SK) ENC (m2, SK) Client Server
12
USE case Property: Given two files, which one comes before in alphabetical order. Client stores files on server by encrypting them. Later client wants to retrieve the file which comes first in alphabetical order. Server uses ππΈππ to compare encrypted files. Sorts the files in alphabetical order.
13
Property preserving encryption
Introduced by Pandey and Rouselakis in 2012 [PR12]. PR12 gives a protocol for the inner-product property. We improve their protocol in two crucial ways. Exploit connection b/n Private-key FE and PPE. PR12 Our protocol Composite-order groups Prime order groups Generic group model Standard model (DLIN assumption)
14
Public-key functional encryption
15
Alice πβπΉ MPK πβπ ENC (m, MPK) MSK, MPK MPK Adversary MPK π πΎ π
Trusted Authority π πΎ π DEC ( ENC(m),π πΎ π ) = f(m) Julie
16
Indistinguishability based def.
Message hiding: π 1 and π 2 s.t. π( π 1 ) = π( π 2 ). πΈππ( π 1 ) indistinguishable from πΈππ( π 2 ). Function hiding: π1 and π2 s.t. π1(π) = π2(π). π πΎ π1 indistinguishable from π πΎ π2 . By creating πΈππ( π 1 ), πΈππ π 2 , πΈππ( π 3 ),β¦ compute π1 π 1 , π1 π 2 , π1( π 3 ) or π2 π 1 , π2 π 2 , π2 π 3 . Could distinguish between π1 and π2. Intuitively, given πΈππ(π) and SK for π, the only information Bob learns is π(π).
17
Simulation based def. A new definition for Functional Encryption:
Simulation based (real-ideal world), Provides both function and message hiding, Simple and intuitive. Real world execution of a protocol is compared with an βIdealβ world. Ideal world: Security requirements we want from our protocol.
18
Real World Ideal World MSK, MPK MPK Environment Environment
π 1 , π 2 ,β¦, π πβ1 , π π MSK, MPK π 1 , π 2 ,β¦, π πβ1 ,π π MPK πΈππ ( π 1 ) π 1 π 1 , π 2 π 2 , β¦, π πβ1 ( π π ) β¦, πΈππ( π π ) π π π 1 , π π π 2 , β¦, π π ( π π ) π πΎ π 1 β¦,π πΎ π π Trusted Authority Adversary Oracle Simulator π 1 β¦,π π π π βπΉ π 1 β¦, π π π π βπ Environment Environment β π΄ππ£ β πππ π
πππβπΌππππ
19
Our set-up Strong security definition.
Cannot be realized in the standard model [BSW11, OβN11, BO12]. Adversary doesnβt exploit structure of the group. Generic group model: captures most real-world attacks. Function family F: inner product predicates. Looking at some special cases of Functional Encryption. Inner-product predicates capture those cases.
20
Identity based encryption
ID = {Bob, Alice, Mary, β¦} and π={ π 1 , π 2 , π 3 ,β¦}. πΉ= π ππ ππβπΌπ·}. π={(π,π π β² )|πβπ, π π β² βπΌπ·}. π ππ π, π π β² =π if ππ=ππβ², and β₯ otherwise. Authority gives secret key according to id Ex: Alice gets a SK for π π΄ππππ Bob sends πΈππ( π β , π΄ππππ) to Alice. Only Alice can obtain π β , using SK for π π΄ππππ .
21
Complex policies Complex policies like Head of Dept. OR (Faculty AND Security). πΌ π· πππ ={π»πππ ππ π·πππ‘., πΉπππ’ππ‘π¦, ππ‘π’ππππ‘π , β¦} πΌ π· ππππ ={ππππ’πππ‘π¦,π΄ππππππ‘βππ , π΄πΌ,β¦} π΅πΈπ₯π= π΅ππππππ ππ₯ππππ π ππππ ππ£ππ πΌ π· πππ πππ πΌ π· ππππ πΉ= π ππ1, ππ2 ππ1βπΌ π· πππ , ππ2βπΌ π· ππππ } π= π, πππ₯π πβπ, πππ₯πβπ΅ππ₯π} π ππ1, ππ2 π, πππ₯π =π iff πΌ π· 1 and πΌ π· 2 satisfy the Boolean Expression πππ₯π.
22
Inner-product Predicates
Powerful primitive: Identity Based Encryption Complex Policies like Boolean Expressions πΉ= π π£ π£ =( π£ 1 , π£ 2 ,β¦, π£ π )}. π= π, π₯ π₯ =( π₯ 1 , π₯ 2 ,β¦, π₯ π )}. π π£ π, π₯ =π if π£ . π₯ =β π£ π . π₯ π =0, and β₯ otherwise. Given a key for π π£ we would be able to recover π from an encryption (π, π₯ ) only if π£ . π₯ =0.
23
Our protocol A protocol for inner-product predicates in the Generic group model, which is secure under a strong simulation- based definition. Two constructions Dual Pairing Vector Spaces (Okamoto and Takashima in 2008). Secret Sharing. The constructions have comparable efficiency. For vectors of length n, ciphertext and key of length 3n.
24
Conclusion A new powerful definition for Public-Key Functional Encryption. Protocol in the Generic group model. Another definition Relax-SIM. Protocol in the standard model. Improve protocols for Private-Key Functional Encryption and Property Preserving Encryption in various ways. First protocols under standard assumptions/model.
25
Thank You Paper will soon be available on Eprint.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.