Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
On the Achievability of Simulation-Based Security for Functional Encryption
De caro, Angelo; IOVINO, Vincenzo; Jain, Abhishek et al.
2013In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II
Peer reviewed
 

Documents


Texte intégral
main.pdf
Postprint Éditeur (604.99 kB)
Extended version
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Functional Encryption; Hidden-Vector Encryption; Simulation-Security
Résumé :
[en] This work attempts to clarify to what extent simulation-based security (SIM-security) is achievable for functional encryption (FE) and its relation to the weaker indistinguishability-based security (IND-security). Our main result is a compiler that transforms any FE scheme for the general circuit functionality (which we denote by Circuit-FE) meeting indistinguishability-based security (IND-security) to a Circuit-FE scheme meeting SIM-security, where: In the random oracle model, the resulting scheme is secure for an unbounded number of encryption and key queries, which is the strongest security level one can ask for. In the standard model, the resulting scheme is secure for a bounded number of encryption and non-adaptive key queries, but an unbounded number of adaptive key queries. This matches known impossibility results and improves upon Gorbunov et al. [CRYPTO’12] (which is only secure for non-adaptive key queries). Our compiler is inspired by the celebrated Fiat-Lapidot-Shamir paradigm [FOCS’90] for obtaining zero-knowledge proof systems from witness-indistinguishable proof systems. As it is currently unknown whether Circuit-FE meeting IND-security exists, the purpose of this result is to establish that it remains a good target for future research despite known deficiencies of IND-security [Boneh et al. – TCC’11, O’Neill – ePrint ’10]. We also give a tailored construction of SIM-secure hidden vector encryption (HVE) in composite-order bilinear groups. Finally, we revisit the known negative results for SIM-secure FE, extending them to natural weakenings of the security definition and thus providing essentially a full picture of the (in)achievability of SIM-secure FE.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
De caro, Angelo
IOVINO, Vincenzo ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Jain, Abhishek;  Johns Hopkins University
O'Neill, Adam;  Georgetown University
Paneth, Omer;  Boston University
Persiano, Giuseppe;  University of Salerno
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
On the Achievability of Simulation-Based Security for Functional Encryption
Date de publication/diffusion :
2013
Nom de la manifestation :
CRYPTO 2013
Organisateur de la manifestation :
IACR
Lieu de la manifestation :
Santa Barbara, Etats-Unis - Californie
Date de la manifestation :
from 18-08-2013 to 22-08-2013
Manifestation à portée :
International
Titre de l'ouvrage principal :
Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II
Maison d'édition :
Springer
ISBN/EAN :
978-3-642-40083-4
Collection et n° de collection :
Lecture Notes in Computer Science 8043
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Disponible sur ORBilu :
depuis le 21 février 2016

Statistiques


Nombre de vues
162 (dont 8 Unilu)
Nombre de téléchargements
201 (dont 2 Unilu)

citations Scopus®
 
62
citations Scopus®
sans auto-citations
47
citations WoS
 
62

Bibliographie


Publications similaires



Contacter ORBilu