2012
DOI: 10.1007/978-3-642-32009-5_11
|View full text |Cite
|
Sign up to set email alerts
|

Functional Encryption with Bounded Collusions via Multi-party Computation

Abstract: Abstract. We construct functional encryption schemes for polynomialtime computable functions secure against an a-priori bounded polynomial number of collusions. Our constructions require only semantically secure public-key encryption schemes and pseudorandom generators computable by small-depth circuits (known to be implied by most concrete intractability assumptions). For certain special cases such as predicate encryption schemes with public index, the construction requires only semantically secure encryption… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
161
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 214 publications
(165 citation statements)
references
References 30 publications
(30 reference statements)
1
161
0
Order By: Relevance
“…From a definitional stand-point, SIM/USIM-based security notions are preferable to IND-based security notion, as they offer a stronger security guarantee that has a natural, intuitive and aesthetically pleasing interpretation via the real/ideal paradigm. On the other hand, IND-based security notion allows us to bypass the impossibility results given in [BSW11] and in this work; in addition, they guarantee message composability in that security with a single ciphertext implies security for multiple ciphertexts (and so does NA-SIM considered in [GVW12]). We do not offer a complete answer to this conundrum; instead, we point out that 1-AD-SIM and 1-AD-USIM appear to be an adequate compromise for predicate encryption and general functional encryption respectively.…”
Section: Discussionmentioning
confidence: 93%
See 4 more Smart Citations
“…From a definitional stand-point, SIM/USIM-based security notions are preferable to IND-based security notion, as they offer a stronger security guarantee that has a natural, intuitive and aesthetically pleasing interpretation via the real/ideal paradigm. On the other hand, IND-based security notion allows us to bypass the impossibility results given in [BSW11] and in this work; in addition, they guarantee message composability in that security with a single ciphertext implies security for multiple ciphertexts (and so does NA-SIM considered in [GVW12]). We do not offer a complete answer to this conundrum; instead, we point out that 1-AD-SIM and 1-AD-USIM appear to be an adequate compromise for predicate encryption and general functional encryption respectively.…”
Section: Discussionmentioning
confidence: 93%
“…adversary A = (A 1 , A 2 ), the following two distributions are computationally indistinguishable: Remarks on the Definition. Our definition is stronger than that in [BSW11] but weaker than that in [GVW12]; our lower bound in Section 4 holds for all three definitions. Amongst the three, the one in [GVW12] is the only for which we know a composition theorem where security for one message implies security for many messages, in the non-adaptive setting.…”
Section: We Call a Stateful Simulator Algorithm Sim Admissible If Onmentioning
confidence: 93%
See 3 more Smart Citations