Paper 2013/403
Function-Private Subspace-Membership Encryption and Its Applications
Dan Boneh, Ananth Raghunathan, and Gil Segev
Abstract
Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy in public-key searchable encryption. Intuitively, their notion asks that decryption keys reveal essentially no information on their corresponding identities, beyond the absolute minimum necessary. While Boneh et al. showed how to construct function-private identity-based encryption (which implies predicate-private encrypted keyword search), searchable encryption typically requires a richer set of predicates. In this paper we significantly extend the function privacy framework. First, we introduce the new notion of subspace-membership encryption, a generalization of inner-product encryption, and formalize a meaningful and realistic notion for capturing its function privacy. Then, we present a generic construction of a function-private subspace-membership encryption scheme based on any inner-product encryption scheme. Finally, we show that function-private subspace-membership encryption can be used to construct function-private identity-based encryption. These are the first generic constructions of function-private encryption schemes based on non-function-private ones, resolving one of the main open problems posed by Boneh, Raghunathan, and Segev.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- A minor revision of an IACR publication in ASIACRYPT 2013
- Keywords
- Function privacyfunctional encryption.
- Contact author(s)
- segev @ cs huji ac il
- History
- 2014-07-29: last of 6 revisions
- 2013-06-20: received
- See all versions
- Short URL
- https://ia.cr/2013/403
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/403, author = {Dan Boneh and Ananth Raghunathan and Gil Segev}, title = {Function-Private Subspace-Membership Encryption and Its Applications}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/403}, year = {2013}, url = {https://eprint.iacr.org/2013/403} }