Show simple item record

dc.contributor.authorAnanth, Prabhanjan
dc.contributor.authorBrakerski, Zvika
dc.contributor.authorSegev, Gil
dc.contributor.authorVaikuntanathan, Vinod
dc.date.accessioned2021-11-08T20:55:17Z
dc.date.available2021-11-08T20:55:17Z
dc.date.issued2015
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttps://hdl.handle.net/1721.1/137827
dc.description.abstract© International Association for Cryptologic Research 2015. In a functional encryption (FE) scheme, the owner of the secret key can generate restricted decryption keys that allow users to learn specific functions of the encrypted messages and nothing else. In many known constructions of FE schemes, security is guaranteed only for messages that are fixed ahead of time (i.e., before the adversary even interacts with the system). This so-called selective security is too restrictive for many realistic applications. Achieving adaptive security (also called full security), where security is guaranteed even for messages that are adaptively chosen at any point in time, seems significantly more challenging. The handful of known adaptively-secure schemes are based on specifically tailored techniques that rely on strong assumptions (such as obfuscation or multilinear maps assumptions) can be transformed into an adaptively-secure one without introducing any additional assumptions. We present a black-box transformation, for both public-key and private-key schemes, making novel use of hybrid encryption, a classical technique that was originally introduced for improving the efficiency of encryption schemes. We adapt the hybrid encryption approach to the setting of functional encryption via a technique for embedding a “hidden execution thread” in the decryption keys of the underlying scheme, which will only be activated within the proof of security of the resulting scheme. As an additional application of this technique, we show how to construct functional encryption schemes for arbitrary circuits starting from ones for shallow circuits (NC1 or even TC0).en_US
dc.language.isoen
dc.publisherSpringer Natureen_US
dc.relation.isversionof10.1007/978-3-662-48000-7_32en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceOther repositoryen_US
dc.titleFrom Selective to Adaptive Security in Functional Encryptionen_US
dc.typeArticleen_US
dc.identifier.citationAnanth, Prabhanjan, Brakerski, Zvika, Segev, Gil and Vaikuntanathan, Vinod. 2015. "From Selective to Adaptive Security in Functional Encryption."
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2019-07-09T16:21:55Z
dspace.date.submission2019-07-09T16:21:56Z
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record