How to leverage hardness of constant degree expanding polynomials over R to build iO.

IACR Cryptol. ePrint Arch.(2019)

引用 45|浏览50
暂无评分
摘要
In this work, we introduce and construct D-restricted Functional Encryption (FE) for any constant D >= 3, based only on the SXDH assumption over bilinear groups. This generalizes the notion of 3-restricted FE recently introduced and constructed by Ananth et al. (ePrint 2018) in the generic bilinear group model. A D = (d + 2)-restricted FE scheme is a secret key FE scheme that allows an encryptor to efficiently encrypt a message of the form M = (x, y, z). Here, x is an element of F-p(dxn) and y, z is an element of F-p(n). Function keys can be issued for a function f = Sigma(I=(i1, ... , id, j, k)) c(I) center dot x[1, i(1)] ... x[d, i(d)] center dot y[j] center dot z[k] where the coefficients c(I) is an element of F-p. Knowing the function key and the cipher-text, one can learn f(x, y, z), if this value is bounded in absolute value by some polynomial in the security parameter and n. The security requirement is that the ciphertext hides y and z, although it is not required to hide x. Thus x can be seen as a public attribute. D-restricted FE allows for useful evaluation of constant-degree polynomials, while only requiring the SXDH assumption over bilinear groups. As such, it is a powerful tool for leveraging hardness that exists in constant-degree expanding families of polynomials over R. In particular, we build upon the work of Ananth et al. to show how to build indistinguishability obfuscation (iO) assuming only SXDH over bilinear groups, LWE, and assumptions relating to weak pseudorandom properties of constant-degree expanding polynomials over R.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要