Registered encryption (Garg et al. TCC'18) is an emerging paradigm that tackles the key-escrow problem associated with identity-based encryption by replacing the private-key generator with a much weaker entity known as the key curator. The key curator holds no secret information, and is responsible to: (i) update the master public key whenever a new user registers its own public key to the system; (ii) provide helper decryption keys to the users already registered in the system, in order to still enable them to decrypt after new users join the system. For practical purposes, tasks (i) and (ii) need to be efficient, in the sense that the size of the public parameters, of the master public key, and of the helper decryption keys, as well as the running times for key generation and user registration, and the number of updates, must be small. In this paper, we generalize the notion of registered encryption to the setting of functional encryption (FE). As our main contribution, we show an efficient construction of registered FE for the special case of (attribute-hiding) inner-product predicates, built over asymmetric bilinear groups of prime order. Our scheme supports a large attribute universe and is proven secure in the bilinear generic group model. We also implement our scheme and experimentally demonstrate the efficiency requirements of the registered settings. Our second contribution is a feasibility result where we build registered FE for P/Poly based on indistinguishability obfuscation and somewhere statistically binding hash functions.

Registered (Inner-Product) Functional Encryption / Francati, Danilo; Friolo, Daniele; Maitra, Monosij; Malavolta, Giulio; Rahimi, Ahmadreza; Venturi, Daniele. - 14442 LNCS:(2023), pp. 98-133. (Intervento presentato al convegno 29th International Conference on the Theory and Application of Cryptology and Information Security tenutosi a Guangzhou, China) [10.1007/978-3-030-17653-2_7].

Registered (Inner-Product) Functional Encryption

Danilo Francati
;
Daniele Friolo
;
Daniele Venturi
2023

Abstract

Registered encryption (Garg et al. TCC'18) is an emerging paradigm that tackles the key-escrow problem associated with identity-based encryption by replacing the private-key generator with a much weaker entity known as the key curator. The key curator holds no secret information, and is responsible to: (i) update the master public key whenever a new user registers its own public key to the system; (ii) provide helper decryption keys to the users already registered in the system, in order to still enable them to decrypt after new users join the system. For practical purposes, tasks (i) and (ii) need to be efficient, in the sense that the size of the public parameters, of the master public key, and of the helper decryption keys, as well as the running times for key generation and user registration, and the number of updates, must be small. In this paper, we generalize the notion of registered encryption to the setting of functional encryption (FE). As our main contribution, we show an efficient construction of registered FE for the special case of (attribute-hiding) inner-product predicates, built over asymmetric bilinear groups of prime order. Our scheme supports a large attribute universe and is proven secure in the bilinear generic group model. We also implement our scheme and experimentally demonstrate the efficiency requirements of the registered settings. Our second contribution is a feasibility result where we build registered FE for P/Poly based on indistinguishability obfuscation and somewhere statistically binding hash functions.
2023
29th International Conference on the Theory and Application of Cryptology and Information Security
registered encryption; functional encryption; inner-product predicate encryption
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Registered (Inner-Product) Functional Encryption / Francati, Danilo; Friolo, Daniele; Maitra, Monosij; Malavolta, Giulio; Rahimi, Ahmadreza; Venturi, Daniele. - 14442 LNCS:(2023), pp. 98-133. (Intervento presentato al convegno 29th International Conference on the Theory and Application of Cryptology and Information Security tenutosi a Guangzhou, China) [10.1007/978-3-030-17653-2_7].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1702050
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact