TY - GEN
T1 - Function-private subspace-membership encryption and its applications
AU - Boneh, Dan
AU - Raghunathan, Ananth
AU - Segev, Gil
PY - 2013
Y1 - 2013
N2 - Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy in public-key searchable encryption. Intuitively, their notion asks that decryption keys reveal essentially no information on their corresponding identities, beyond the absolute minimum necessary. While Boneh et al. showed how to construct function-private identity-based encryption (which implies predicate-private encrypted keyword search), searchable encryption typically requires a richer set of predicates. In this paper we significantly extend the function privacy framework. First, we consider the notion of subspace-membership encryption, a generalization of inner-product encryption, and formalize a meaningful and realistic notion for capturing its function privacy. Then, we present a generic construction of a function-private subspace-membership encryption scheme based on any inner-product encryption scheme. This is the first generic construction that yields a function-private encryption scheme based on a non-function-private one. Finally, we present various applications of function-private subspacemembership encryption. Among our applications, we significantly improve the function privacy of the identity-based encryption schemes of Boneh et al.: whereas their schemes are function private only for identities that are highly unpredictable (with min-entropy of at least λ + ω(log λ) bits, where λ is the security parameter), we obtain functionprivate schemes assuming only the minimal required unpredictability (i.e., min-entropy of only ω(log λ) bits). This improvement offers a much more realistic function privacy guarantee.
AB - Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy in public-key searchable encryption. Intuitively, their notion asks that decryption keys reveal essentially no information on their corresponding identities, beyond the absolute minimum necessary. While Boneh et al. showed how to construct function-private identity-based encryption (which implies predicate-private encrypted keyword search), searchable encryption typically requires a richer set of predicates. In this paper we significantly extend the function privacy framework. First, we consider the notion of subspace-membership encryption, a generalization of inner-product encryption, and formalize a meaningful and realistic notion for capturing its function privacy. Then, we present a generic construction of a function-private subspace-membership encryption scheme based on any inner-product encryption scheme. This is the first generic construction that yields a function-private encryption scheme based on a non-function-private one. Finally, we present various applications of function-private subspacemembership encryption. Among our applications, we significantly improve the function privacy of the identity-based encryption schemes of Boneh et al.: whereas their schemes are function private only for identities that are highly unpredictable (with min-entropy of at least λ + ω(log λ) bits, where λ is the security parameter), we obtain functionprivate schemes assuming only the minimal required unpredictability (i.e., min-entropy of only ω(log λ) bits). This improvement offers a much more realistic function privacy guarantee.
KW - Function privacy
KW - functional encryption
UR - http://www.scopus.com/inward/record.url?scp=84892404183&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-42033-7_14
DO - 10.1007/978-3-642-42033-7_14
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84892404183
SN - 9783642420320
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 255
EP - 275
BT - Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
T2 - 19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013
Y2 - 1 December 2013 through 5 December 2013
ER -