Paper 2017/1001
Impossibility of Order-Revealing Encryption in Idealized Models
Mark Zhandry and Cong Zhang
Abstract
An Order-Revealing Encryption (ORE) scheme gives a public procedure by which two ciphertexts can be compared to reveal the order of their underlying plaintexts. The ideal security notion for ORE is that \emph{only} the order is revealed --- anything else, such as the distance between plaintexts, is hidden. The only known constructions of ORE achieving such ideal security are based on cryptographic multilinear maps and are currently too impractical for real-world applications. In this work, we give evidence that building ORE from weaker tools may be hard. Indeed, we show black-box separations between ORE and most symmetric-key primitives, as well as public key encryption and anything else implied by generic groups in a black-box way. Thus, any construction of ORE must either (1) achieve weaker notions of security, (2) be based on more complicated cryptographic tools, or (3) require non-black-box techniques. This suggests that any ORE achieving ideal security will likely be somewhat inefficient. Central to our proof is a proof of impossibility for something we call \emph{information theoretic ORE}, which has connections to tournament graphs and a theorem by Erdös. This impossibility proof will be useful for proving other black box separations for ORE.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Black-box separationsOrder-revealing encryptionRandom oracle modelGeneric group model
- Contact author(s)
-
mzhandry @ princeton edu
congresearch @ gmail com - History
- 2018-09-21: revised
- 2017-10-13: received
- See all versions
- Short URL
- https://ia.cr/2017/1001
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/1001, author = {Mark Zhandry and Cong Zhang}, title = {Impossibility of Order-Revealing Encryption in Idealized Models}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/1001}, year = {2017}, url = {https://eprint.iacr.org/2017/1001} }