Practical CCA-Secure Functional Encryptions for Deterministic Functions

المؤلفون المشاركون

Wang, Huige
Pan, Tianyu
Zhao, Yunlei
Chen, Kefei

المصدر

Security and Communication Networks

العدد

المجلد 2020، العدد 2020 (31 ديسمبر/كانون الأول 2020)، ص ص. 1-14، 14ص.

الناشر

Hindawi Publishing Corporation

تاريخ النشر

2020-09-08

دولة النشر

مصر

عدد الصفحات

14

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الملخص EN

Functional encryption (FE) can implement fine-grained control to encrypted plaintext via permitting users to compute only some specified functions on the encrypted plaintext using private keys with respect to those functions.

Recently, many FEs were put forward; nonetheless, most of them cannot resist chosen-ciphertext attacks (CCAs), especially for those in the secret-key settings.

This changed with the work, i.e., a generic transformation of public-key functional encryption (PK-FE) from chosen-plaintext (CPA) to chosen-ciphertext (CCA), where the underlying schemes are required to have some special properties such as restricted delegation or verifiability features.

However, examples for such underlying schemes with these features have not been found so far.

Later, a CCA-secure functional encryption from projective hash functions was proposed, but their scheme only applies to inner product functions.

To construct such a scheme, some nontrivial techniques will be needed.

Our key contribution in this work is to propose CCA-secure functional encryptions in the PKE and SK environment, respectively.

In the existing generic transformation from (adaptively) simulation-based CPA- (SIM-CPA-) secure ones for deterministic functions to (adaptively) simulation-based CCA- (SIM-CCA-) secure ones for randomized functions, whether the schemes were directly applied to CCA settings for deterministic functions is not implied.

We give an affirmative answer and derive a SIM-CCA-secure scheme for deterministic functions by making some modifications on it.

Again, based on this derived scheme, we also propose an (adaptively) indistinguishable CCA- (IND-CCA-) secure SK-FE for deterministic functions.

The final results show that our scheme can be instantiated under both nonstandard assumptions (e.g., hard problems on multilinear maps and indistinguishability obfuscation (IO)) and under standard assumptions (e.g., DDH, RSA, LWE, and LPN).

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Wang, Huige& Chen, Kefei& Pan, Tianyu& Zhao, Yunlei. 2020. Practical CCA-Secure Functional Encryptions for Deterministic Functions. Security and Communication Networks،Vol. 2020, no. 2020, pp.1-14.
https://search.emarefa.net/detail/BIM-1208596

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Wang, Huige…[et al.]. Practical CCA-Secure Functional Encryptions for Deterministic Functions. Security and Communication Networks No. 2020 (2020), pp.1-14.
https://search.emarefa.net/detail/BIM-1208596

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Wang, Huige& Chen, Kefei& Pan, Tianyu& Zhao, Yunlei. Practical CCA-Secure Functional Encryptions for Deterministic Functions. Security and Communication Networks. 2020. Vol. 2020, no. 2020, pp.1-14.
https://search.emarefa.net/detail/BIM-1208596

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references

رقم السجل

BIM-1208596