Paper 2017/319
Encrypt-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting
Sikhar Patranabis and Debdeep Mukhopadhyay
Abstract
We present new public-key predicate encryption schemes in the standard model that are provably function private under standard computational assumptions. A large class of existing function private constructions in the public-key setting impose highly stringent requirements on the min-entropy of predicate distributions, thereby limiting their applicability in the context of real-world predicates. Other existing constructions are either secure only in the generic group model, or require strong assumptions such as indistinguishability obfuscation. Our constructions, on the other hand, are function private for predicate distributions that satisfy more realistic min-entropy requirements, and avoid the need for strong assumptions such as obfuscation. In order to prove function privacy, we adopt the indistinguishability-based framework proposed by Boneh, Raghunathan and Segev in Crypto'13. The framework requires a secret-key corresponding to a predicate sampled from a distribution with min-entropy super logarithmic in the security parameter $\lambda$, to be computationally indistinguishable from another secret-key corresponding to a uniformly and independently sampled predicate. Within this framework, we develop a novel approach, denoted as {encrypt-augment-recover}, that takes an existing predicate encryption scheme and transforms it into a computationally function private one while retaining its original data privacy guarantees. Our approach leads to public-key constructions for identity-based encryption (IBE) and inner-product encryption (IPE) that are computationally function private in the standard model under a family of weaker variants of the DLIN assumption.
Note: The paper is augmented with a revised related work section
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Predicate EncryptionPublic-KeyFunction PrivacyComputational IndistinguishabilityMin-EntropyIdentity-Based EncryptionInner-Product Encryption
- Contact author(s)
- sikhar patranabis @ iitkgp ac in
- History
- 2017-09-18: last of 66 revisions
- 2017-04-14: received
- See all versions
- Short URL
- https://ia.cr/2017/319
- License
-
CC BY