You are looking at a specific version 20130617:183742 of this paper. See the latest version.

Paper 2013/364

On the Achievability of Simulation-Based Security for Functional Encryption

Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano

Abstract

This work attempts to clarify to what extent simulation-based security (SIM-security) is achievable for functional encryption (FE) and its relation to the weaker indistinguishability-based security (IND-security). Our main result is a compiler that transforms any FE scheme for the general circuit functionality (which we denote by circuit-FE) meeting indistinguishability-based security (IND-security) to a circuit-FE scheme meeting SIM-security, where: \begin{itemize} \item In the random oracle model, the resulting scheme is secure for an unbounded number of encryption and key queries, which is the strongest security level one can ask for. \item In the standard model, the resulting scheme is secure for a bounded number of encryption and non-adaptive key queries, but an \emph{unbounded} number of adaptive key queries. This matches known impossibility results and improves upon Gorbunov et al. [CRYPTO'12] (which is only secure for \emph{non-adaptive} key queries). \end{itemize} Our compiler is inspired by the celebrated Fiat-Lapidot-Shamir paradigm [FOCS'90] for obtaining zero-knowledge proof systems from witness-indistinguishable proof systems. As it is currently unknown whether circuit-FE meeting IND-security exists, the purpose of this result is to establish that it remains a good target for future research despite known deficiencies of IND-security [Boneh et al. -- TCC'11, O'Neill -- ePrint '10]. We also give a tailored construction of SIM-secure hidden vector encryption (HVE) in composite-order bilinear groups. Finally, we revisit the known negative results for SIM-secure FE, extending them to natural weakenings of the security definition and thus providing essentially a full picture of the

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. this is an IACR version of a Crypto 2013 paper
Contact author(s)
omer @ bu edu
History
2018-02-09: last of 3 revisions
2013-06-10: received
See all versions
Short URL
https://ia.cr/2013/364
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.