obfustopia built on secret key functional encryption
play

Obfustopia Built on Secret-Key Functional Encryption Fuyuki - PowerPoint PPT Presentation

Obfustopia Built on Secret-Key Functional Encryption Fuyuki Kitagawa (Tokyo Institute of Technology) Ryo Nishimaki (NTT Secure Platform Laboratories) Keisuke Tanaka(Tokyo Institute of Technology) Our results Focus Constructing


  1. Obfustopia Built on Secret-Key Functional Encryption Fuyuki Kitagawa (Tokyo Institute of Technology) Ryo Nishimaki (NTT Secure Platform Laboratories) Keisuke Tanaka(Tokyo Institute of Technology)

  2. Our results Focus � Constructing indistinguishability obfuscation (IO) from secret-key functional encryption (SKFE) collusion-resistant IO SKFE for all circuits 1-key succinct SKFE

  3. Obfuscation unintelligible preserving functionality Obfuscation obfuscated code program code Virtual-black-box (VBB) obfuscation is most natural and intuitive But, impossibility for VBB obfuscation L à Many works focus on an weaker notion indistinguishability obfuscation (IO) No impossibility J

  4. Usefulness and difficulty of IO Many works constructed a wide variety of crypto primitives from IO many classical primitives, deniable encryption, collusion-resistant FE program watermarking

  5. Usefulness and difficulty of IO Many works constructed a wide variety of crypto primitives from IO many classical primitives, deniable encryption, collusion-resistant FE program watermarking However, “IO from standard assumption” is still major open question little studied L All constructions rely on multi-linear maps…

  6. Usefulness and difficulty of IO Many works constructed a wide variety of crypto primitives from IO many classical primitives, deniable encryption, collusion-resistant FE program watermarking However, “IO from standard assumption” is still major open question little studied L All constructions rely on multi-linear maps… To realize IO from mild assumptions, It’s important to find seemingly weaker primitives implying IO We have functional encryption

  7. Functional encryption (FE) encryption key cloud data data data

  8. Functional encryption (FE) encryption key cloud data data data master secret key functional key (decryption key function f tied to f)

  9. Functional encryption (FE) encryption key only cloud data f(data) data data data master secret key functional key (decryption key function f tied to f)

  10. Functional encryption (FE) encryption key only cloud data f(data) data data data master secret key ≠ � public-key (PKFE) functional key (decryption key function f � secret-key (SKFE) � tied to f)

  11. Succinctness / Collusion-resistance u Ciphertext size γ (0 ≤ γ < 1) � � succinct , cipher data text (or size of enc circuit)

  12. Succinctness / Collusion-resistance u Ciphertext size γ (0 ≤ γ < 1) � � succinct , cipher data text (or size of enc circuit) u # of issuable functional keys issuable unbounded keys à collusion-resistant … master issuable only 1 functional key à 1-key scheme secret key

  13. Previous works exp loss [BV15, AJ15] 1-key IO succinct PKFE for all circuits

  14. Previous works +PKE exp loss [BNPW16, KNT18] [BV15, AJ15] 1-key coll-resist IO succinct PKFE SKFE for all circuits + LWE or IBE [LPST16, BNPW16, KNT18] 1-key succinct SKFE

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend