Paper 2013/403

Function-Private Subspace-Membership Encryption and Its Applications

Dan Boneh, Ananth Raghunathan, and Gil Segev

Abstract

Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy in public-key searchable encryption. Intuitively, their notion asks that decryption keys reveal essentially no information on their corresponding identities, beyond the absolute minimum necessary. While Boneh et al. showed how to construct function-private identity-based encryption (which implies predicate-private encrypted keyword search), searchable encryption typically requires a richer set of predicates. In this paper we significantly extend the function privacy framework. First, we introduce the new notion of subspace-membership encryption, a generalization of inner-product encryption, and formalize a meaningful and realistic notion for capturing its function privacy. Then, we present a generic construction of a function-private subspace-membership encryption scheme based on any inner-product encryption scheme. Finally, we show that function-private subspace-membership encryption can be used to construct function-private identity-based encryption. These are the first generic constructions of function-private encryption schemes based on non-function-private ones, resolving one of the main open problems posed by Boneh, Raghunathan, and Segev.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A minor revision of an IACR publication in ASIACRYPT 2013
Keywords
Function privacyfunctional encryption.
Contact author(s)
segev @ cs huji ac il
History
2014-07-29: last of 6 revisions
2013-06-20: received
See all versions
Short URL
https://ia.cr/2013/403
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/403,
      author = {Dan Boneh and Ananth Raghunathan and Gil Segev},
      title = {Function-Private Subspace-Membership Encryption and Its Applications},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/403},
      year = {2013},
      url = {https://eprint.iacr.org/2013/403}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.