Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
Deniable Functional Encryption
De caro, Angelo; IOVINO, Vincenzo; O'Neill, Adam
2016In Public-key Cryptography - PKC 2016, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Peer reviewed
 

Documents


Texte intégral
main.pdf
Postprint Éditeur (487.8 kB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Deniable encryption; Functional encryption; Simulation-security
Résumé :
[en] Deniable encryption, first introduced by Canetti et al. (CRYPTO 1997), allows a sender and/or receiver of encrypted communication to produce fake but authentic-looking coins and/or secret keys that “open” the communication to a different message. Here we initiate its study for the more general case of functional encryption (FE), as introduced by Boneh et al. (TCC 2011), wherein a receiver in possession of a key k can compute from any encryption of a message x the value F (k, x) according to the scheme’s functionality F . Our results are summarized as follows: We put forth and motivate the concept of deniable FE, for which we consider two models. In the first model, as previously considered by O’Neill et al. (CRYPTO 2011) in the case of identity-based encryption, a receiver gets assistance from the master authority to generate a fake secret key. In the second model, there are “normal” and “deniable” secret keys, and a receiver in possession of a deniable secret key can produce a fake but authentic-looking normal key on its own. This parallels the “multi-distributional” model of deniability previously considered for public-key encryption. In the first model, we show that any FE scheme for the general circuit functionality (as several recent candidate construction achieve) can be converted into an FE scheme having receiver deniability, without introducing any additional assumptions. In addition we show an efficient receiver deniable FE for Boolean Formulae from bilinear maps. In the second (multi-distributional) model, we show a specific FE scheme for the general circuit functionality having receiver deniability. This result additionally assumes differing-inputs obfuscation and relies on a new technique we call delayed trapdoor circuits. To our knowledge, a scheme in the multi-distributional model was not previously known even in the simpler case of identity-based encryption. Finally, we show that receiver deniability for FE implies some form of simulation security, further motivating study of the latter and implying optimality of our results.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
De caro, Angelo;  IBM Zurich
IOVINO, Vincenzo ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
O'Neill, Adam;  Georgetown University
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Deniable Functional Encryption
Date de publication/diffusion :
2016
Nom de la manifestation :
19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Organisateur de la manifestation :
IACR
Lieu de la manifestation :
Taipei, Taiwan
Date de la manifestation :
fom 06-03-2015 to 09-03-2015
Manifestation à portée :
International
Titre de l'ouvrage principal :
Public-key Cryptography - PKC 2016, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Maison d'édition :
Springer
Edition :
1
ISBN/EAN :
978-3-662-49384-7
Collection et n° de collection :
Lecture Notes in Computer Science 9614
Pagination :
27
Peer reviewed :
Peer reviewed
Projet FnR :
FNR7884937 - Cryptography For Cloud Homomorphic Encrypted Secure Systems, 2014 (01/12/2014-30/11/2016) - Vincenzo Iovino
Commentaire :
An extended version has been published in IET Information Security. DOI: 10.1049/iet-ifs.2017.0040
Disponible sur ORBilu :
depuis le 21 février 2016

Statistiques


Nombre de vues
302 (dont 22 Unilu)
Nombre de téléchargements
378 (dont 8 Unilu)

citations Scopus®
 
16
citations Scopus®
sans auto-citations
15

Bibliographie


Publications similaires



Contacter ORBilu