Compact Adaptively Secure ABE from ๐-Lin: Beyond NC1 and Towards NL
Huijia (Rachel) Lin and Ji Luo
1 / 42
Compact Adaptively Secure ABE from -Lin: Beyond NC 1 and Towards NL - - PowerPoint PPT Presentation
Compact Adaptively Secure ABE from -Lin: Beyond NC 1 and Towards NL Huijia (Rachel) Lin and Ji Luo 1 / 42 Attribute-Based Encryption [SW05] Setup mpk, msk KeyGen msk, sk policy Compact: ct = sk Expressive:
1 / 42
policy attribute message
(sk is authorized)
Compact: ct = ๐ ๐ฆ Expressive: ๐ โ powerful class of functions
2 / 42
๐ โ sk๐
๐ ๐ฆ = 0 for all ๐
(sk๐โs are unauthorized)
Collusion Resistance
3 / 42
mpk ๐
๐
sk๐
๐
๐
๐
sk๐
๐
ct โ Enc ๐ฆ, ๐๐
๐ ๐ฆ = 0, then Exp0 โ Exp1
๐ฆ, ๐0, ๐1
4 / 42
mpk ๐
๐
sk๐
๐
๐
๐
sk๐
๐
๐0, ๐1 ct โ Enc ๐ฆ, ๐๐
๐ ๐ฆ = 0, then Exp0 โ Exp1
๐ฆ,
5 / 42
Arithmetic Branching Programs โ NC1, arithmetic computation over โค๐. NC1 and ABP are non-uniform: Each sk works with attribute of fixed length.
6 / 42
* relaxed compactness ABE for uniform computation: Each sk works with attribute of any length.
7 / 42
NOT compact NOT adaptive NON-standard assumptions
all-in-one: compact, adaptive, standard assumptions
[LOSTW10] for MSP [GPSW06] for MSP [GVW13, BGGHNSVV14] for ฮค ๐ poly [LW12] for MSP
๐-type assumption
[KW19] for NC1 [GW20] for BP concurrent this work for ABP โธ ๐-Lin in pairing groups
8 / 42
NOT compact NOT adaptive NON-standard assumptions
all-in-one: compact, adaptive, standard assumptions [Wat12, Att14, AMY19, GWW19] for DFA [GW20] for DFA concurrent this work for DFA, NFA
[GW20] for NFA concurrent beyond finite automata [AS16] for P (FE, based on iO) this work for L, NL ct = ๐ ๐ฆ ๐๐2๐ sk = ๐ TM (relaxed compactness)
9 / 42
information-theoretic tool
1-key = 1-ciphertext secret-key special randomized encoding computational tool
10 / 42
Randomized Encoding Partially Hiding [IW14]
use ๐ as one-time pad convenience โ ๐ in secret key
11 / 42
๐ โ โค๐
๐
a.k.a. โlabelsโ
not hidden
12 / 42
๐ โ โค๐
๐
13 / 42
isk 2 โ KeyGen msk, ๐ 2 ict 1 โ Enc msk, ๐ 1
T
โฒ
โฒ
โฒ
โฒ
โฒ
โฒ
if ๐๐, ๐๐ = ๐๐
โฒ, ๐๐ โฒ for all ๐, ๐
14 / 42
isk 2 โ KeyGen msk, ๐ 2 ict 1 โ Enc msk, ๐ 1
T
๐
๐
๐๐ โ ๐ปT
= pairing
15 / 42
๐1, โฆ , ๐๐ โ Garble ๐, ๐
๐โ ๐
T
linear
IPFE Dec
labels in the exponent
T
16 / 42
Real World
17 / 42
18 / 42
19 / 42
20 / 42
Simulator
Real Garbling
21 / 42
22 / 42
23 / 42
Real World Simulation
๐ > 1 {isk ( ๐๐
๐ > 1 {isk ( 0
๐1, โฆ , ๐๐ โ Garble ๐, ๐ โ1, โฆ , โ๐ = ๐1 ๐ฆ , โฆ , ๐๐ ๐ฆ โ2, โฆ , โ๐ โ โค๐ find โ1 s.t. Eval โฏ = ๐๐ ๐ฆ = 0
same distribution of labels need same labels to use IPFE honestly generated labels simulated labels
24 / 42
We show that AKGS for ABP [IW14] is piecewise secure.
25 / 42
Real World
26 / 42
27 / 42
find โ1 s.t. Eval โฏ = ๐๐ ๐ฆ
28 / 42
find โ1 s.t. Eval โฏ = ๐๐ ๐ฆ = 0
29 / 42
find โ1 s.t. Eval โฏ = ๐๐ ๐ฆ = 0
30 / 42
find โ1 s.t. Eval โฏ = ๐๐ ๐ฆ = 0
31 / 42
find โ1 s.t. Eval โฏ = ๐๐ ๐ฆ = 0
Goal achieved: simulate โ2
32 / 42
Final Simulation
find โ1 s.t. Eval โฏ = ๐๐ ๐ฆ = 0
33 / 42
uses msk multi {
34 / 42
35 / 42
pseudorandom via DDH.
36 / 42
uses msk
multi {
multi {
37 / 42
multi {
public slot private slot
multi {
Enc using mpk (or msk) Enc needs msk not hidden function-hiding
for scheme for proof KeyGen needs msk
38 / 42
ABP for
slotted IPFE ABP for
uniform computation: more challenges
39 / 42
(or ๐ฆ โ TM for DFA/NFA)
40 / 42
as if we did Garble ๐, ๐; ๐x โ ๐f
# isk, ๐f โ ๐ # ict, ๐x โ ๐๐๐2๐
DDH ๐ T
with ๐f isk1 isk2 โฏ isk# with ๐x ict1 ict2 โฎ ict# โ11 โ21 โ12 โ22 โฎ โ#1 โฎ โ#2 โฏ โฏ โ1# โ2# โฑ โฏ โฎ โ## # โ โ ๐๐๐2๐๐
41 / 42
slotted IPFE
ia.cr/2020/318
42 / 42