Functional Encryption for Inner Product with Full Function Privacy
by
Sourav Mukhopadhyay
joint work with
Functional Encryption for Inner Product with Full Function Privacy - - PowerPoint PPT Presentation
Functional Encryption for Inner Product with Full Function Privacy by Sourav Mukhopadhyay joint work with Pratish Datta and Ratna Dutta Department of Mathematics Indian Institute of Technology Kharagpur Kharagpur-721302 India PKC 2016
by
joint work with
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 1
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 2
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 3
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 4
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Challenger (C) Adversary (A) Runs PKFP-IPE.Setup Runs PKFP-IPE.KeyGen Runs PKFP-IPE.Encrypt pp ( y(j,0), y(j,1)) sk
y(j,c)
c′ ∈ {0, 1} ( x(ℓ,0), x(ℓ,1)) ct
x(ℓ,c)
Setup Query Phase Guess Chooses c ∈$ {0, 1}
y(j,0) = x(ℓ,1), y(j,1)∀j, ℓ AdvPKFP-IPE
A
(λ) = |Pr[c′ = c] − 1/2| ≤ negl(λ)
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 5
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 6
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
1, g˘ s 2) = e(g1, g2)s˘ s for all s, ˘
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 7
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
# » v 1 , ˘
# » w 2 ) = E(gs # » v 1 , g˘ s # » w 2 ) = E(g # » v 1 , g # » w 2 )s˘ s
p and
# » v 1 , g # » w 2 ) = 1GT for all #
p, then #
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 8
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
1 Choose B = (bi,j)i,j=1,...,n
2 Compute B∗ = (b∗
3 Let, #
4 Set B = {#
5 (B, B∗) are dual orthonormal in the sense that for i, i′ = 1, . . . , n,
6 Return (B, B∗). Sourav Mukhopadhyay
FE for Inner Product with Full Function Privacy
6–9th March, 2016 9
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
1 (p, G1, G2, GT , g1, g2, e)
2 (p, V1, V2, GT , A1, A2, E) ← GDPVS
3
4 Define
5 Keep msk = (
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 10
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
p\{#
1 Select α, ξ, ξ0
i=1 xi
2 Output ct #
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 11
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
p\{#
1 Pick γ, η, η0
i=1 yi
i +η #
4n+1
1+η0 #
5
2 Provide sk #
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 12
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
» x = (c1, c2), sk # » y = (k∗ 1, k∗ 2) 1 It computes
2 Attempt to determine a value m ∈ Zp such that T m
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 13
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 14
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 15
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
$
$
1
$
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 16
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 17
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
» x |
» y |
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 18
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 19
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 20
Introduction Preliminaries Our PKFP-IPE Scheme Security Efficiency Conclusion
Sourav Mukhopadhyay FE for Inner Product with Full Function Privacy 6–9th March, 2016 21