Recently, more progressive approaches such as multiinput functional encryption 19, functional encryption using intel sgx 39 and practical implementation 18, 25 have been proposed. A fundamental limitation of their work, however, is that the total number of users which corresponds to the arity of the. Functional encryption fe is a vast new paradigm for encryption scheme which allows tremendous flexibility in accessing encrypted data. In proceedings of the 34th annual international conference on the theory and applications of cryptographic techniques eurocrypt 2015 dan.
Bibliographic content of iacr cryptology eprint archive, volume 20. Sign up repository for building and running applications of multilinear maps, which include multiinput functional encryption mife and obfuscation. Fulldomain hash hsw separation results for circular security krw,mo functional witness encryption bcp. Now, if we give the secret key sk f and the encryption key ek 1. In many known constructions of fe schemes, security is guaranteed only for messages that are fixed ahead of time i. Saikrishna badrinarayanan, eric miles, amit sahai, mark zhandry. Multiinput functional encryption can apply to this example. Provable security of tweakable block ciphers based on substitutionpermutation networks benoit cogliati university of luxembourg, luxembourg, yevgeniy dodis nyu, jonathan katz university of maryland, jooyoung lee kaist, john steinberger, aishwarya thiruvengadam ucsb, zhe zhang tsinghua university. Functional encryption is about providing a computable circuit obfuscated with io which receives as input encrypted versions of some value x, and returns fx for some function f, without revealing anything else about x. Dov gordon jonathan katzy fenghao liuz elaine shix hongsheng zhouabstract functional encryption fe is a powerful primitive enabling. We initiate a systematic study of mmapbased constructions, building a general framework, called 5gen, to experiment with program obfuscation and multiinput functional encryption. Functional encryption is a type of publickey encryption, where the party that has access to a secret key can learn a function from that key, which is used to encrypt and decrypt messages. Their software often uses three or more programming languages. From selective to adaptive security in functional encryption.
High con dence software and systems conference invited talk, may 2017 secure computation of mips machine code workshop on cryptography for the ram model of computation. Fast software encryption fse 2020 will take place in athens, greece in march 2226. Stronger security from weaker assumptions journal of cryptology, 2018. In terms of security, however, their privatekey scheme satis es a weak selective notion, which does. Multiinput functional encryption for unbounded arity functions, asiacrypt 2015, 2015.
Multi input functional encryption mife introduced by goldwasser et al. In particular, we extend the 5gen framework ccs 2016 to support circuitbased mife and program obfuscation. Sep 11, 2017 multi input inner product functional encryption from pairings. Let us begin by clarifying the setting of multi input functional encryption. From singleinput to multiinput functional encryption in. Multiinput functional encryption for unbounded arity. Multiinput functional encryption and program obfuscation for arithmetic circuits brent carmer oregon state universitygalois, inc. In particular, we extend the 5gen framework ccs 2016 to support circuitbased mife and program obfuscation, implementing both existing and new constructions. Public key encryption, digital signature, symmetric key cryptography, and applications.
Multiinput functional encryption mife was introduced by goldwasser et al. Deniable encryption sw multiinput functional encryption gggjklssz14 functional encryption for randomized functions gjks noninteractive multiparty key exchange bz, abgsz removing random oracles. Multiinput functional encryption without obfuscation. In this paper we present a construction for secretkey multi input functional encryption from multilinear maps. Multi input inner product functional encryption from pairings. In this work, we explore in detail cryptographic program obfuscation and the related primitive of multiinput functional encryption mife. Functional encryption supporting recursive languages. Secure internet of things project sitp publications. Multiinput functional is a very general tool for computing on encrypting data, which allows for mining aggregate information from several di erent data sources rather than just a single source as in single input functional encryption. In mife, a receiver is able to compute a joint function of multiple, independently encrypted plaintexts. Multiinput innerproduct functional encryption from. Namely, we construct a scheme where a functional key corresponding to a function f enables a user holding. Multi input functional encryption can apply to this example.
In this paper we initiate a systematic study of mmapbased constructions. In an fe scheme, secret keys tokens correspond to functions. We present new constructions of multiinput functional encryption mife schemes for the innerproduct functionality that improve the state of the art solution of abdalla et al. In terms of security, however, their privatekey scheme satis es a weak selective notion, which does not. We introduce the problem of multiinput functional encryption, where a secret key sk f can correspond to an nary function f that takes multiple ciphertexts as input.
Joint work with alex malozemoff, daniel apon, brent carmer, adam foltzer, daniel wagner, david archer, dan boneh, jonathan katz, and mariana raykova. Multiinput functional encryption, with shafi goldwasser, s. Multi input functional encryption, with shafi goldwasser, s. Multiinput functional encryption in the privatekey. We also focus on adding new features that make functional encryption more relevant to practical scenarios, such as multiinput functional encryption, where encryption is split among di. The notion of multi input functional encryption mife was recently introduced by goldwasser et al.
We also give techniques to decentralize the generation of functional decryption keys, and the setup of the functional encryption. A mife scheme has several encryption slots and each decryption key sk ffor a multiinput function fdecrypts jointly ciphertexts encx 1, encx n for all slots to obtain fx 1. Ilan komargodski, gil segev and eylon yogev functional encryption for randomized functionalities in the privatekey setting from minimal assumptions. Broadcast encryption and traitor tracing bz,abgsz deniable encryption sw multi input functional encryption gggjklssz14 functional encryption for randomized functions gjks noninteractive multiparty key exchange bz, abgsz removing random oracles. Multi input functional encryption alice m1 bob carol gm1,m2 goldwasser, gordon, goyal, jain, katz, liu, sahai, shi, zhou 14 dave m2 pk setup msk keygen sk f skg fm1,m2. 2 intel sgx background intel software guard extensions sgx mab+ is a set of processor extensions to intels x86 design. We will talk about recent advances on multi input function encryption, an emerging cryptographic paradigm that allows finegrained access control over encrypted data. Sgx enabled functional encryption and applications. Multiinput innerproduct functional encryption from pairings. Newest functionalencryption questions cryptography stack.
Eurocrypt14 as a means to noninteractively compute aggregate information on the joint private data of multiple users. Adaptively secure puncturable pseudorandom functions in the standard. Improved construction for inner product functional encryption. Jun 06, 2019 multi input functional encryption for unbounded arity functions. Application of multi input functional encryption to iot cloud security. Goldwasser s, gordon sd, goyal v, jain a, katz j, liu f, sahai a, shi e, zhou h 2014. Ytmx580 multiinput temperature transmitter ytmx580 can accept inputs from up to 8 points of measurement such as thermocouples 8 types.
Ytmx580 multiinput temperature transmitter yokogawa. The notion of multiinput functional encryption mife was recently introduced by goldwasser et al. Secure multilinear maps mmaps have been shown to have remarkable applications in cryptography, such as program obfuscation and multiinput functional encryption mife. Eurocrypt 2014 show various applications of mife to running sql queries over encrypted databases, computing over encrypted. Professional software development environments usually provide a debugger, which helps programmers to locate and fix faults unfortunately, physical computing does not have analogous support tools and thus it was sometimes difficult for participants in our study to identify what the problem was. Multi input functional encryption and program obfuscation for arithmetic circuits brent carmer oregon state universitygalois, inc. We introduce the problem of multi input functional encryption, where a secret key sk f can correspond to an nary function f that takes multiple ciphertexts as input. In this work, we explore in detail cryptographic program obfuscation and the related primitive of multi input functional encryption mife. Previous constructions of multiinput functional encryption schemes either relied on somewhat stronger assumptions and provided weaker security guarantees goldwasser et al. Eurocrypt 2014 as a compelling extension of functional encryption. Is this technique related to encryption schemes or it is a form of circuit construction. Dovgordon2,vipulgoyal3,abhishekjain4, jonathankatz 5,fenghaoliu,amitsahai7,elaineshi5, andhong. Fulldomain hash hsw separation results for circular security krw,mo.
A fundamental limitation of their work, however, is that the total number of users which corresponds to the arity of the functions supported by. To date, there has been little evaluation of the performance of these applications. Zvika brakerski, ilan komargodski and gil segev multi input functional encryption in the privatekey setting. Previous constructions of multi input functional encryption schemes either relied on somewhat stronger assumptions and provided weaker security guarantees goldwasser et al. Nevertheless, mife does not directly apply to our scenario. Multiinput functional encryption microsoft research. Dov gordon, vipul goyal, abhishek jain, fenghao liu, amit sahai, elaine shi, and hongsheng zhou eurocrypt 2014 this publication is the result of a merge with this paper verifiable oblivious storage, with daniel apon, elaine shi, and aishwarya thiruvengadam. Newest functionalencryption questions cryptography. We present a multiinput functional encryption scheme mife for the inner product functionality based on the klin assumption in primeorder bilinear groups. Multiinput functional encryption with unboundedmessage.
In our setting, there are an unbounded number of possible clients, each of which gets a. Eurocrypt 2014 show various applications of mife to running sql queries over encrypted databases. Our construction works for any polynomial number of encryption slots and achieves adaptive security against unbounded collusion, while relying on standard polynomial hardness assumptions. Let us begin by clarifying the setting of multiinput functional encryption. Multiinput functional encryption for inner products. Practical orderrevealing encryption with limited leakage. We initiate a systematic study of mmapbased constructions, building a general framework, called 5gen, to experiment with program obfuscation and multi input functional encryption. Multi party key exchange for unbounded parties from indistinguishability obfuscation.
Taking as an example the paper multiinput functional encryption, a key is hardwired in the description of the key generation scheme. From singleinput to multiinput functional encryption in the. From single input to multi input functional encryption in the privatekey setting zvika brakerski ilan komargodskiy gil segevz abstract we construct a generalpurpose multi input functional encryption scheme in the privatekey setting. Multiinput functional encryption mife introduced by goldwasser et al. Earlybird registration is open until february 26 and the detailed program will be out soon.
Multi input functional encryption mife was introduced by goldwasser et al. Jain, abhishek johns hopkins whiting school of engineering. Recently, more progressive approaches such as multi input functional encryption 19, functional encryption using intel sgx 39 and practical implementation 18, 25 have been proposed. Multi input functional encryption for unbounded arity functions. Multi input functional encryption for inner products function hiding. Hosting services on an untrusted cloud stanford university. Multi input functional encryption for unbounded arity functions, asiacrypt 2015, 2015. Functional encryption is about providing a computable circuit obfuscated with io which receives as input encrypted versions of some value x, and returns fx for some function f, without revealing anything else. In terms of functionality, their schemes are extremely expressive, supporting all multiinput functions that are computable by boundedsize circuits. We present a multi input functional encryption scheme mife for the inner product functionality based on the klin assumption in primeorder bilinear groups. Multi input functional is a very general tool for computing on encrypting data, which allows for mining aggregate information from several di erent data sources rather than just a single source as in single input functional encryption.
Multiparty key exchange for unbounded parties from indistinguishability obfuscation. International conference on the theory and application of cryptology and information security. Taking as an example the paper multi input functional encryption, a key is hardwired in the description of the key generation scheme. We formulate both indistinguishabilitybased and simulationbased definitions of security for this notion, and show close connections with indistinguishability and virtual black. Multiinput functional encryption alice m1 bob carol gm1,m2 goldwasser, gordon, goyal, jain, katz, liu, sahai, shi, zhou 14 dave m2 pk setup msk keygen sk f skg fm1,m2. Generalpurpose multiinput functional encryption gggjklssz14, bv15, aj15 powerful cryptographic primitive that fully subsumes ore achieves bestpossible security impractical requires obfuscating a prf. In a functional encryption fe scheme, the owner of the secret key can generate restricted decryption keys that allow users to learn specific functions of the encrypted messages and nothing else. Extending functional encryption to address the multiinput setting is the focus of this work. Multiinput functional encryption for unbounded arity functions. We formulate both indistinguishabilitybased and simulationbased definitions of security for this notion, and show close connections with indistinguishability and virtual blackbox definitions of obfuscation.
955 88 345 604 916 223 1209 1255 928 885 1279 891 323 1016 1173 1389 324 511 1529 680 1090 465 760 629 601 246 202 284 1047 446 1181 424 1223 1497 33