Show simple item record

dc.contributor.authorBrakerski, Zvika
dc.contributor.authorGoldwasser, Shafi
dc.contributor.authorKalai, Yael Tauman
dc.date.accessioned2012-10-15T14:12:40Z
dc.date.available2012-10-15T14:12:40Z
dc.date.issued2011-03
dc.date.submitted2011-03
dc.identifier.isbn978-3-642-19570-9
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/73953
dc.description8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedingsen_US
dc.description.abstractWe show how to achieve public-key encryption schemes that can securely encrypt nonlinear functions of their own secret key. Specifically, we show that for any constant d ∈ ℕ, there exists a public-key encryption scheme that can securely encrypt any function f of its own secret key, assuming f can be expressed as a polynomial of total degree d. Such a scheme is said to be key-dependent message (KDM) secure w.r.t. degree-d polynomials. We also show that for any constants c,e, there exists a public-key encryption scheme that is KDM secure w.r.t. all Turing machines with description size clogλ and running time λ [superscript e] , where λ is the security parameter. The security of such public-key schemes can be based either on the standard decision Diffie-Hellman (DDH) assumption or on the learning with errors (LWE) assumption (with certain parameters settings). In the case of functions that can be expressed as degree-d polynomials, we show that the resulting schemes are also secure with respect to key cycles of any length. Specifically, for any polynomial number n of key pairs, our schemes can securely encrypt a degree-d polynomial whose variables are the collection of coordinates of all n secret keys. Prior to this work, it was not known how to achieve this for nonlinear functions. Our key idea is a general transformation that amplifies KDM security. The transformation takes an encryption scheme that is KDM secure w.r.t. some functions even when the secret keys are weak (i.e. chosen from an arbitrary distribution with entropy k), and outputs a scheme that is KDM secure w.r.t. a richer class of functions. The resulting scheme may no longer be secure with weak keys. Thus, in some sense, this transformation converts security with weak keys into amplified KDM security.en_US
dc.language.isoen_US
dc.publisherSpringer Berlin / Heidelbergen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-642-19571-6_13en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceOther University Web Domainen_US
dc.titleBlack-box circular-secure encryption beyond affine functionsen_US
dc.typeArticleen_US
dc.identifier.citationBrakerski, Zvika, Shafi Goldwasser, and Yael Tauman Kalai. “Black-Box Circular-Secure Encryption Beyond Affine Functions.” Theory of Cryptography. Ed. Yuval Ishai. LNCS Vol. 6597. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. 201–218.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.mitauthorGoldwasser, Shafi
dc.relation.journalTheory of Cryptographyen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsBrakerski, Zvika; Goldwasser, Shafi; Kalai, Yael Taumanen
dc.identifier.orcidhttps://orcid.org/0000-0003-4728-1535
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record