Paper 2025/744

Candidate Matchmaking Encryption from Attribute-Based Encryption Schemes

Zhuang Shan, School of Mathematics and Statistics, Xidian University, Xi’an 710126, China
Leyou Zhang, School of Mathematics and Statistics, Xidian University, Xi’an 710126, China
Fuchun Guo, Centre for Computer and Information Security Research, University of Wollongong, Wollongong, NSW 2522, Australia
Yong Yu, School of Computer Science, Shaanxi Normal University, Xi'an 710121, China
Abstract

We were deeply impressed by the paper by Ateniese et al., published in Crypto 2019. In it, they presented a black-box construction of matchmaking encryption (ME) based on functional encryption. In our work, we propose an ME scheme based on standard assumptions in the standard model. This scheme has been proven to be secure under the learning with error (LWE) assumption. Our ME scheme is achieved through a novel framework of bilateral-policy attribute-based encryption (BP-ABE) and a new intermediate primitive termed a perturbed pseudorandom generator (PPRG), which facilitates the implementation of authentication functionality by replacing non-interactive zero-knowledge proof functionality. In the scheme presented in this paper, the user's "public key" is generated using Hamming correlation robustness and user attributes. Note that the 'public key' is not public. In order to preserve the privacy of the two parties involved in matchmaking encryption, our BP-ABE scheme does not use the 'public key' directly to encrypt the plaintext. Instead, the message sender selects matching attributes and uses a Hamming correlation robustness and homomorphic pseudorandom function (HPRF) to generate temporary public keys and hide the public key and user attributes. When these temporary public keys satisfy the access policy, the receiver can decrypt the data using their private key. Regarding the authentication function of matchmaking encryption, this paper proposes a non-interactive privacy set intersection (PSI) scheme based on HPRF and PPRG. The message sender encrypts their 'public key' using the proposed PSI scheme as part of the ciphertext. The receiver also encrypts their 'public key' using the proposed PSI scheme and matches the attributes, thereby completing the message authentication function. We consider our approach to be a significant departure from existing constructions, despite its simplicity.

Metadata
Available format(s)
-- withdrawn --
Category
Public-key cryptography
Publication info
Preprint.
Keywords
matchmaking encryptionattribute-based encryptionstandard assumptions
Contact author(s)
arcsec30 @ 163 com
lyzhang @ mail xidian edu cn
fuchun @ uow edu au
yuyong @ snnu edu cn
History
2025-05-18: withdrawn
2025-04-26: received
See all versions
Short URL
https://ia.cr/2025/744
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.