Consistency for Functional Encryption
Autor: | Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2021 |
Předmět: | |
Zdroj: | Badertscher, C, Kiayias, A, Kohlweiss, M & Waldner, H 2021, Consistency for Functional Encryption . in 2021 IEEE 34th Computer Security Foundations Symposium (CSF) . pp. 1-16, 34th IEEE Computer Security Foundations Symposium, 21/06/21 . https://doi.org/10.1109/CSF51468.2021.00045 CSF |
Popis: | In functional encryption (FE) a sender, Alice, encrypts plaintexts for which a receiver, Bob, can obtain functional evaluations, while Charlie is responsible for initializing the encryption keys and issuing the decryption keys. Standard notions of security for FE deal with a malicious Bob and guarantee the confidentiality of Alice’s messages despite the leakage that occurs due to the functional keys that are revealed to the adversary via various forms of indistinguishability experiments that correspond to IND-CPA, IND-CCA and simulation-based security.In this work we provide a complete and systematic investigation of Consistency, a natural security property for FE, that deals with attacks that can be mounted by Alice, Charlie or a collusion of the two against Bob. We develop three main types of consistency notions according to which set of parties is corrupted and investigate their relation to the standard security properties of FE. To validate our different consistency types, we extend the universally composable framework for FE by Matt and Maurer (CSF 2015) and we show that our consistency notions naturally complement FE security by proving how they imply (and are implied by) UC security depending on which set of parties is corrupted; in this way we demonstrate a complete characterization of consistency for FE. Finally, we provide explicit constructions that achieve consistency efficiently either directly via a construction based on MDDH for specific function classes of inner products over a modulo group or generically for all the consistency types via compilers using standard cryptographic tools. |
Databáze: | OpenAIRE |
Externí odkaz: |