Show simple item record

dc.contributor.authorAnanth, Prabhanjan
dc.contributor.authorVaikuntanathan, Vinod
dc.date.accessioned2021-03-03T15:33:57Z
dc.date.available2021-03-03T15:33:57Z
dc.date.issued2019-11
dc.identifier.isbn9783030360290
dc.identifier.isbn9783030360306
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttps://hdl.handle.net/1721.1/130062
dc.description.abstractWe construct private-key and public-key functional encryption schemes in the bounded-key setting; that is, secure against adversaries that obtain an a-priori bounded number of functional keys (also known as the collusion bound). An important metric considered in the literature on bounded-key functional encryption schemes is the dependence of the running time of the encryption algorithm on the collusion bound Q = Q(λ) (where λ is the security parameter). It is known that bounded-key functional encryption schemes with encryption complexity growing with ε > 0, for any constant Q1-λ, implies indistinguishability obfuscation. On the other hand, in the public-key setting, it was previously unknown whether we could achieve encryption complexity growing linear with Q, also known as optimal bounded-key FE, based on well-studied assumptions. In this work, we give the first construction of an optimal bounded-key public-key functional encryption scheme under the minimal assumption of the existence of any public-key encryption scheme. Moreover, our scheme supports the class of all polynomial-size circuits. Our techniques also extend to the private-key setting. We achieve a construction of an optimal bounded-key functional encryption in the private-key setting based on the minimal assumption of one-way functions, instead of learning with errors as achieved in prior works.en_US
dc.language.isoen
dc.publisherSpringer International Publishingen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-030-36030-6_8en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceProf. Vinod Vaikuntanathan via Phoebe Ayersen_US
dc.titleOptimal Bounded-Collusion Secure Functional Encryptionen_US
dc.typeBooken_US
dc.identifier.citationAnanth, Prabhanjan and Vinod Vaikuntanathan. "Optimal Bounded-Collusion Secure Functional Encryption." TCC: Theory of Cryptography Conference, Lecture Notes in Computer Science, 11891, Springer International Publishing, 2019, 174-198. © 2019 International Association for Cryptologic Research.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.relation.journalLecture Notes in Computer Scienceen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2021-02-25T13:43:17Z
dspace.orderedauthorsAnanth, P; Vaikuntanathan, Ven_US
dspace.date.submission2021-02-25T13:44:21Z
mit.journal.volume11891en_US
mit.licenseOPEN_ACCESS_POLICY
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record