Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Non-trivial Witness Encryption and Null-iO from Standard Assumptions

  • Conference paper
  • First Online:

Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 11035))

Included in the following conference series:

  • 1335Accesses

Abstract

Awitness encryption (WE) scheme can take any\({{\textsf {NP}}}\) statement as a public-key and use it to encrypt a message. If the statement is true then it is possible to decrypt the message given a corresponding witness, but if the statement is false then the message is computationally hidden. Ideally, the encryption procedure should run in polynomial time, but it is also meaningful to define a weaker notion, which we callnon-trivially exponentially efficient WE (XWE), where the encryption run-time is only required to be much smaller than the trivial\(2^{m}\) bound for\({{\textsf {NP}}}\) relations with witness sizem. We show how to construct such XWE schemes for all of\({{\textsf {NP}}}\) with encryption run-time\(2^{m/2}\) under the sub-exponential learning with errors (LWE) assumption. For\({{\textsf {NP}}}\) relations that can be verified in\({{\textsf {NC}}^1}\) (e.g., SAT) we can also construct such XWE schemes under the sub-exponential Decisional Bilinear Diffie-Hellman (DBDH) assumption. Although we find the result surprising, it follows via a very simple connection toattribute-based encryption.

We also show how to upgrade the above results to get non-trivially exponentially efficientindistinguishability obfuscation for null circuits (niO), which guarantees that the obfuscations of any two circuits that always output 0 are indistinguishable. In particular, under the LWE assumptions we get a XniO scheme where the obfuscation time is\(2^{n/2}\) for all circuits with input sizen. It is known that in the case of indistinguishability obfuscation (iO) for all circuits, non-trivially efficient XiO schemes imply fully efficient iO schemes (Lin et al., PKC ’16) but it remains as a fascinating open problem whether any such connection exists for WE or niO.

Lastly, we explore a potential approach toward constructing fully efficient WE and niO schemes via multi-input ABE.

Z. Brakerski—Supported by the Israel Science Foundation (Grant No. 468/14), Binational Science Foundation (Grants No. 2016726, 2014276), and by the European Union Horizon 2020 Research and Innovation Program via ERC Project REACT (Grant 756482) and via Project PROMETHEUS (Grant 780701).

A. Jain and A. Passelègue—Research supported in part from a DARPA/ARL SAFEWARE award, NSF Frontier Award 1413955, NSF grants 1619348, 1228984, 1136174, and 1065276, BSF grant 2012378, a Xerox Faculty Research Award, a Google Faculty Research Award, an equipment grant from Intel, and an Okawa Foundation Research Grant. This material is based upon work supported by the Defense Advanced Research Projects Agency through the ARL under Contract W911NF-15-C-0205. The views expressed are those of the authors and do not reflect the official policy or position of the Department of Defense, the National Science Foundation, or the U.S. Government.

I. Komargodski—Supported in part by a Packard Foundation Fellowship and by an AFOSR grant FA9550-15-1-0262. Most of this work was done at the Weizmann Institute of Science, supported by a grant from the Israel Science Foundation (no. 950/16) and by a Levzion Fellowship.

D. Wichs—Research supported by NSF grants CNS-1314722, CNS-1413964, CNS-1750795.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Similar content being viewed by others

Notes

  1. 1.

    One difference is that XiO only restricts the size of the obfuscated programs but not the run-time of the obfuscation procedure, while XWE and XniO also restricts the run-time of the encryption and obfuscation procedures (which then implicitly restricts the size of the ciphertexts and obfuscated programs). This is important since, without restricting the run-time, trivial WE and niO constructions can achieve short ciphertext and obfuscated program sizes.

  2. 2.

    Notice that in the RAM model, decryption is very efficient as it requires accessing only one key and one ciphertext.

  3. 3.

    The property that in the RAM model our decryption is very efficient is common to all of our results. We only state it here and avoid repeating it in the other results.

  4. 4.

    Recall that a scheme with short functional keys has the property that the size of a functional key for a function of sizes and depthd is\(\mathsf {poly}(d,\lambda )\) for some fixed polynomial function\(\mathsf {poly}\).

References

  1. Barak, B., et al.: On the (im)possibility of obfuscating programs. J. ACM59(2), 6 (2012). Preliminary version appeared in CRYPTO 2001

    Article MathSciNet  Google Scholar 

  2. Bitansky, N., Nishimaki, R., Passelègue, A., Wichs, D.: From cryptomania to obfustopia through secret-key functional encryption. In: Hirt, M., Smith, A. (eds.) TCC 2016. LNCS, vol. 9986, pp. 391–418. Springer, Heidelberg (2016).https://doi.org/10.1007/978-3-662-53644-5_15

    Chapter  Google Scholar 

  3. Boneh, D., et al.: Fully key-homomorphic encryption, arithmetic circuit abe and compact garbled circuits. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 533–556. Springer, Heidelberg (2014).https://doi.org/10.1007/978-3-642-55220-5_30

    Chapter  Google Scholar 

  4. Boneh, D., Sahai, A., Waters, B.: Functional encryption: a new vision for public-key cryptography. Commun. ACM55(11), 56–64 (2012).https://doi.org/10.1145/2366316.2366333

    Article  Google Scholar 

  5. Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1–17. Springer, Heidelberg (2013).https://doi.org/10.1007/978-3-642-38348-9_1

    Chapter  Google Scholar 

  6. Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th Annual Symposium on Foundations of Computer Science, pp. 40–49. IEEE Computer Society Press, October 2013

    Google Scholar 

  7. Garg, S., Gentry, C., Sahai, A., Waters, B.: Witness encryption and its applications. In: Symposium on Theory of Computing Conference, STOC, pp. 467–476 (2013)

    Google Scholar 

  8. Goldwasser, S., et al.: Multi-input functional encryption. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 578–602. Springer, Heidelberg (2014).https://doi.org/10.1007/978-3-642-55220-5_32

    Chapter  Google Scholar 

  9. Gorbunov, S., Vaikuntanathan, V., Wee, H.: Attribute-based encryption for circuits. In: Symposium on Theory of Computing Conference, STOC 2013, Palo Alto, CA, USA, 1–4 June 2013, pp. 545–554. ACM (2013)

    Google Scholar 

  10. Gorbunov, S., Vaikuntanathan, V., Wee, H.: Predicate encryption for circuits from LWE. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9216, pp. 503–523. Springer, Heidelberg (2015).https://doi.org/10.1007/978-3-662-48000-7_25

    Chapter  Google Scholar 

  11. Goyal, R., Koppula, V., Waters, B.: Lockable obfuscation. In: 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS, pp. 612–621. IEEE Computer Society (2017)

    Google Scholar 

  12. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98. ACM (2006)

    Google Scholar 

  13. Komargodski, I., Naor, M., Yogev, E.: Secret-sharing for NP. J. Cryptol.30(2), 444–469 (2017)

    Article MathSciNet  Google Scholar 

  14. Komargodski, I., Segev, G.: From minicrypt to obfustopia via private-key functional encryption. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10210, pp. 122–151. Springer, Cham (2017).https://doi.org/10.1007/978-3-319-56620-7_5

    Chapter  Google Scholar 

  15. Lin, H., Pass, R., Seth, K., Telang, S.: Indistinguishability obfuscation with non-trivial efficiency. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) PKC 2016. LNCS, vol. 9615, pp. 447–462. Springer, Heidelberg (2016).https://doi.org/10.1007/978-3-662-49387-8_17

    Chapter  Google Scholar 

  16. Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) 37th Annual ACM Symposium on Theory of Computing, pp. 84–93. ACM Press, May 2005

    Google Scholar 

  17. Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. In: Shmoys, D.B. (ed.) 46th Annual ACM Symposium on Theory of Computing, pp. 475–484. ACM Press, May/Jun 2014

    Google Scholar 

  18. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005).https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  19. Wichs, D., Zirdelis, G.: Obfuscating compute-and-compare programs under LWE. In: 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS, pp. 600–611. IEEE Computer Society (2017)

    Google Scholar 

Download references

Acknowledgements

We thank Nir Bitansky for many initial discussions on the topics of this work. We thank Antigoni Polychroniadou and Hoeteck Wee for their helpful comments on a previous version of our work. We also thank the anonymous reviewers for their remarks.

Author information

Authors and Affiliations

  1. Weizmann Institute of Science, 76100, Rehovot, Israel

    Zvika Brakerski

  2. UCLA, Los Angeles, CA, 90095, USA

    Aayush Jain & Alain Passelègue

  3. Cornell Tech, New York, NY, 10044, USA

    Ilan Komargodski

  4. Northeastern University, Boston, 02115, USA

    Daniel Wichs

Authors
  1. Zvika Brakerski

    You can also search for this author inPubMed Google Scholar

  2. Aayush Jain

    You can also search for this author inPubMed Google Scholar

  3. Ilan Komargodski

    You can also search for this author inPubMed Google Scholar

  4. Alain Passelègue

    You can also search for this author inPubMed Google Scholar

  5. Daniel Wichs

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toIlan Komargodski.

Editor information

Editors and Affiliations

  1. University of Catania, Catania, Italy

    Dario Catalano

  2. University of Salerno, Fisciano, Italy

    Roberto De Prisco

A Multi-input ABE and Non-trivial Witness Encryption

A Multi-input ABE and Non-trivial Witness Encryption

In this section, we introduce the notion of multi-input attribute based encryption and show that, in the most general setting, it implies witness encryption for\({{\textsf {NP}}}\).

Recall that in a standard ABE scheme, one can encrypt a messageb relative to some attribute\(\alpha \) to get\(\mathsf {ct}_{\alpha ,b}\) and independently generate keys for Boolean functionsf to get\(\mathsf {sk}_f\). Together,\(\mathsf {ct}_{\alpha ,b}\) and\(\mathsf {sk}_f\) can be used to recoverb if\(f(\alpha ) = 1\), and otherwise,b should remain computationally hidden. We extend this notion to the multi-input setting. Heref takes as input a sequence of attributes\(\alpha _1,\dots ,\alpha _k\) for\(k \ge 1\) and the encryption functionality takes an additional parameter\(i\in [k]\) (it ignoresb for\(i\ne 1\)). Given ciphertexts\(\mathsf {ct}_{\alpha _1,b},\mathsf {ct}_{\alpha _2,\cdot },\dots ,\mathsf {ct}_{\alpha _k}\) and a key\(\mathsf {sk}_f\) for such a function, one is able to recoverb if\(f(\alpha _1,\dots ,\alpha _k)=1\) while it should remain hidden if\(f(\alpha _1,\dots ,\alpha _k)=0\). Details follow.

Ak-input ABE scheme is parametrized over an attribute space\(\mathcal {X}=\{\mathcal {X}_{\lambda }\}_{\lambda \in \mathbb {N}}\) and function space\(\{\mathcal {F}_{\lambda }\}_{\lambda \in \mathbb {N}}\), where each function maps\(\mathcal {X}=\{(\mathcal {X}_{\lambda })^k\}_{\lambda \in \mathbb {N}}\) to\(\{ 0,1 \}\). Such a scheme is described by four procedures\((\mathsf {Setup}, \mathsf {KG}, \mathsf {Enc}, \mathsf {Dec})\) with the following syntax:

  1. 1.

    \(\mathsf {Setup}(1^\lambda )\) gets as input a security parameter and outputs a master secret key\(\mathsf {msk}\).

  2. 2.

    \(\mathsf {KG}(\mathsf {msk}, f)\) gets as input a master secret key\(\mathsf {msk}\) and a function\(f\in \mathcal {F}_\lambda \) and outputs a key\(\mathsf {sk}_f\).

  3. 3.

    \(\mathsf {Enc}(\mathsf {msk}, \alpha , b,i)\) gets as input a master secret key\(\mathsf {msk}\), an attribute\(\alpha \in \mathcal {X}_\lambda \) and a message\(b\in \{ 0,1 \}\) and an index\(i\in [k]\), and outputs a ciphertext\(\mathsf {ct}_{\alpha ,b,i}\).

  4. 4.

    \(\mathsf {Dec}(\mathsf {sk}_f, \mathsf {ct}_{\alpha _1,b_1,1},\dots ,\mathsf {ct}_{\alpha _k,b_k,k})\) gets as input a key for the functionf and a sequence of ciphertext of\((\alpha _1, b_1),\dots ,(\alpha _k, b_k)\) and outputs a string\(b'\).

The correctness and security of such a scheme are provided in the next definition.

Definition 6

A tuple of four procedures\((\mathsf {Setup}, \mathsf {KG}, \mathsf {Enc}, \mathsf {Dec})\) is ak-input\((t,\epsilon )\)-secure ABE scheme if

  1. 1.

    Correctness: For every\(\lambda \in \mathbb {N}\),\(b_1,\dots ,b_k\in \{ 0,1 \}\),\(\alpha _1,\dots ,\alpha _k\in \mathcal {X}\),\(f \in \mathcal {F}\), it holds that if\(f(\alpha _1,\dots ,\alpha _k) = 1\), then

    $$\begin{aligned} \Pr [ \mathsf {Dec}(\mathsf {KG}(\mathsf {msk}, f), \mathsf {Enc}(\mathsf {msk}, \alpha _1, b_1, 1), \dots , \mathsf {Enc}(\mathsf {msk}, \alpha _k, b_k, k) ) = b_1 ] = 1 \end{aligned}$$

    where the probability if over the choice of\(\mathsf {msk}\leftarrow \mathsf {Setup}(1^\lambda )\) and over the internal randomness of\(\mathsf {KG}\) and\(\mathsf {Enc}\). Note that only messages encrypted at index 1 can be recovered, thus every message encrypted at a different index could be set to\(\perp \) in our definition at the cost of a slightly more complex syntax.

  2. 2.

    Security: For every polynomial\(p = p(\lambda )\), every\(\vec {\alpha }_1,\dots ,\vec {\alpha }_p\), where\(\vec {\alpha }_i = (\alpha ^{(i)}_1,\dots ,\alpha ^{(i)}_k)\in \mathcal {X}^k\) for\(i\in [p]\), and every\(f_1,\dots ,f_p \in \mathcal {F}\), it holds that if\(f_i(\alpha ^{i_1}_1,\dots ,\alpha ^{i_k}_k) = 0\) for every\(i,i_1,\ldots ,i_k\in [p]\), then

    $$\begin{aligned}&\left\{ \mathsf {KG}(\mathsf {msk}, f_i)\right\} _{i\in [p]}, \left\{ \mathsf {Enc}(\mathsf {msk}, \alpha _j^{(i)}, 0, j)\right\} _{i\in [p],j \in [k]} \approx _{t,\epsilon } \\&\left\{ \mathsf {KG}(\mathsf {msk}, f_i)\right\} _{i\in [p]}, \left\{ \mathsf {Enc}(\mathsf {msk}, \alpha _j^{(i)}, 1, j)\right\} _{i\in [p],j \in [k]}, \end{aligned}$$

    where the randomness is over the choice of\(\mathsf {msk}\leftarrow \mathsf {Setup}(1^\lambda )\) and the internal randomness of\(\mathsf {KG}\) and\(\mathsf {Enc}\).

In the next lemma we show that a general-purpose\(\mathsf {poly}\)-input ABE scheme implies a witness encryption scheme. This is similar to an analogous statement in the functional encryption literature which says that a general purpose multi-input functional encryption scheme implies indistinguishability obfuscation for all circuits [8].

Lemma 1

Let\(L \in \)NP be a language where instances are of size\(n=n(\lambda )\) and witnesses are of size\(m=m(\lambda )\). Anm-input ABE scheme for all polynomial-size circuits implies a witness encryption scheme forL.

Proof

Let\(\mathsf {MIABE} = (\mathsf {Setup}, \mathsf {KG}, \mathsf {Enc}, \mathsf {Dec})\) be them-input ABE scheme. Denote by\(V^{(L)}\) the verification procedure of the\({{\textsf {NP}}}\) languageL. This procedure gets as inputx and a possible witnessw split intom bits\(w_1,\dots ,w_{m}\), and it outputs a bit that specifies whetherw is a valid witness attesting to the fact that\(x\in L\). Given an instance\(x\in \{ 0,1 \}^{n}\) and a message\(b\in \{ 0,1 \}\), the witness encryption\(\mathsf {Enc}(1^\lambda , x,b)\) is computed as follows:

  1. 1.

    Sample a master secret key for the multi-input ABE scheme\(\mathsf {msk}\leftarrow \mathsf {KG}(1^{\lambda })\).

  2. 2.

    Use the ABE scheme to generate a key for the function\(V^{(L)}_x(w_1,\dots ,w_{m}) = V^{(L)}(x,w_1\dots w_{m})\):

    $$\begin{aligned} \mathsf {sk}_f \leftarrow \mathsf {KG}(\mathsf {msk}, V^{(L)}_x). \end{aligned}$$
  3. 3.

    For\(\ell \in \{ 0,1 \}\) and\(i \in [m]\), use the ABE scheme to encryptb under attribute\(\ell \) for the indexi:

    $$\begin{aligned} \mathsf {ct}_{\ell ,b,i} \leftarrow \mathsf {Enc}(\mathsf {msk}, \ell , b, i). \end{aligned}$$
  4. 4.

    Output\(\mathsf {sk}_f\),\(\{\mathsf {ct}_{\ell ,b,i}\}_{\ell \in \{ 0,1 \}, i\in [m]\}}\).

To decrypt a ciphertext\(\mathsf {ct}= (\mathsf {sk}_f, \{\mathsf {ct}_{\ell ,b,i}\}_{\ell \in \{ 0,1 \}, i\in [m]})\) with respect to a witness\(w = w_1\dots w_{m} \in \{ 0,1 \}^{m} \), we execute the decryption procedure of the ABE scheme as follows:

$$\begin{aligned} \mathsf {Dec}(\mathsf {sk}_f, \mathsf {ct}_{w_1,b,1},\dots ,\mathsf {ct}_{w_{m},b,m}). \end{aligned}$$

The correctness and security of the witness encryption scheme follow immediately from the correctness and security of the underlying multi-input ABE scheme. Correctness holds since given a valid witnessw for which\(V^{(L)}(x,w)=1\), the ABE decryption procedure will outputb. Security holds since for any\(x\notin L\), there is no witness for which\(V^{(L)}\) acceptsx and thus\(V^{(L)}_x\) is always 0, which means that no combination of ciphertexts will lead to a successful decryption. The latter, by the security of the underlying ABE scheme implies thatb is computationally hidden.

Using Fewer-Input ABE. Variants of the above theorem can be obtained in case we only have an ABE scheme that supports less inputs. Specifically, similarly to the refinement of [2] of the result of [8] mentioned above (see [14, Lemma 4.2] for the precise statement), one can show that ak-input ABE scheme for\(k=k(\lambda )\) implies a witness encryption scheme for languages with instances of size\(n=n(\lambda )\) and witnesses of size\(k\cdot \log n\). This means that ak-input ABE scheme for any\(k=\omega (1)\), is interesting as it could lead to non-trivial constructions of secret sharing schemes for all\({{\textsf {NP}}}\) based on somewhat weaker assumptions than currently known [13].

Rights and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Brakerski, Z., Jain, A., Komargodski, I., Passelègue, A., Wichs, D. (2018). Non-trivial Witness Encryption and Null-iO from Standard Assumptions. In: Catalano, D., De Prisco, R. (eds) Security and Cryptography for Networks. SCN 2018. Lecture Notes in Computer Science(), vol 11035. Springer, Cham. https://doi.org/10.1007/978-3-319-98113-0_23

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp