Incompressible Functional Encryption
Abstract
Incompressible encryption (Dziembowski, Crypto’06; Guan, Wichs, Zhandry, Eurocrypt’22) protects from attackers that learn the entire decryption key, but cannot store the full ciphertext. In incompressible encryption, the attacker must try to compress a ciphertext within pre-specified memory bound before receiving the secret key.
In this work, we generalize the notion of incompressibility to functional encryption. In incompressible functional encryption, the adversary can corrupt non-distinguishing keys at any point, but receives the distinguishing keys only after compressing the ciphertext to within bits. An important efficiency measure for incompressible encryption is the ciphertext-rate (i.e., ). We give many new results for incompressible functional encryption for circuits, from minimal assumption of (non-incompressible) functional encryption, with
-
1.
-rate- and short secret keys,
-
2.
-rate- and large secret keys.
Along the way, we also give a new incompressible attribute-based encryption for circuits from standard assumptions, with -rate- and short secret keys. Our results achieve optimal efficiency, as incompressible attribute-based/functional encryption with -rate- as well as short secret keys has strong barriers for provable security from standard assumptions. Moreover, our assumptions are minimal as incompressible attribute-based/functional encryption are strictly stronger than their non-incompressible counterparts.
Keywords and phrases:
functional encryption, attribute-based encryption, incompressible encryptionFunding:
Rishab Goyal: Support for this research was provided by OVCRGE at UW–Madison with funding from the Wisconsin Alumni Research Foundation.Copyright and License:
2012 ACM Subject Classification:
Security and privacy Public key encryptionEditor:
Raghu MekaSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
A fundamental principle in cryptography is to leverage “secrets” for differentiating between an honest user legitimately accessing a system and an attacker trying to illegitimately access it. Consider data encryption as an example, where the goal is data secrecy. A central assumption underlying traditional encryption is that an attacker cannot learn anything about a user’s secret decryption key. Moreover, this assumption seems inherent as if an attacker learns the secret key, then how can one distinguish between “capabilities” of an honest user and an attacker!?
In 2006, Dziembowzki [14] proposed an exquisite approach to restrict the “capabilities” of an attacker, even when the entire secret key gets corrupted. The proposal was to view long-term memory storage as a limited and expensive resource. In words, the intuition was that no real-world attacker can maintain an unbounded long-term memory, and it has to pick and choose what it wants to store in its memory. Dziembowzki [14] formalized this in the secret-key setting, and defined it as a forward-secure storage system. Recently, Guan, Wichs, and Zhandry (henceforth GWZ) [23] generalized this to the public-key setting. They labeled cryptography in this model as “incompressible” cryptography. The intuition being that an attacker cannot “compress” its unbounded short-term memory into its bounded long-term memory. GWZ provided multiple constructions for “incompressible” public-key encryption and signatures, from a variety of cryptographic assumptions with different efficiency tradeoffs.
Beyond Public-Key Encryption
Functional encryption (FE) [32, 2, 28, 7] is a powerful generalization of public-key encryption (PKE) [12]. FE generalizes PKE by providing fine-grained access to encrypted data. In FE, the master decryption key holder can create partial “functional” decryption keys for any supported function of its choice. Such a key holder can recover from any ciphertext , encrypting data . Standard indistinguishability-based FE security states that no polytime attacker cannot distinguish between encryptions of messages , unless it receives a secret key s.t. . That is, unless an attacker receives a “distinguishing key” , it cannot distinguish between any two ciphertexts.222Throughout the sequel, by the phrase a “distinguishing key”, we mean a secret key that can distinguish between two ciphertexts (by running decryption). Similarly, by the phrase “non-distinguishing keys”, we mean secret keys that do not enable a trivial distinguishing attack between two ciphertexts. The ability to learn only function evaluation of encrypted data and nothing more has had fascinating consequences in cryptography, both theoretically and practically [33, 5, 11, 32, 22, 8, 2, 28, 7, 30, 17, 15, 20, 34, 10, 19, 29, 31, 21, 26, 27, 4, 13].
While functional keys offer fine-grained access over encrypted data, enabling many superior applications, they also enable far more attack opportunities compared to plain encryption. In PKE, there is just one secret key, and while that implies an all-or-nothing functionality, storing the key securely for the entire system lifetime is much easier. On the contrary, in FE, there are master secret keys as well as functional decryption keys. Each decryption key must be securely generated, distributed, and stored by the appropriate user. While it might be reasonable to expect the central trusted authority will (in most part) store master key securely; expecting this from every other user (holding a functional key) is unrealistic.
Our Contributions: Incompressible FE
In this work, we study incompressible functional encryption systems. We formalize the concept, and provide multiple constructions from a variety of cryptographic assumptions enabling different efficiency tradeoffs. As we elaborate in the full version [18], incompressibility in FE is extremely interesting, both theoretically and practically. In short, it pushes the traditional perception in FE that leaking an entire decryption key is equivalent to learning the function output on every previously encrypted data.
Formalizing incompressible FE.
Interestingly, formally defining incompressibility for FE is more nuanced than for PKE. In public-key encryption, there is just one secret key. Thus, to define incompressibility for PKE, one considers a simple two-stage attacker: in stage 1, the attacker receives a ciphertext that it must “compress” down to bits333 is typically considered to be the bound on the adversary’s long-term storage.; and stage 2, where the attacker receives the secret key (along with the -bit “compressed” ciphertext). As long as such an attacker cannot learn anything about the message, the PKE scheme is a secure incompressible scheme. In functional encryption setting, there are many more secret keys! Thus, depending upon the secret key(s) that a stage 2 attacker learns, there are different formulations of incompressible FE security. Below, we briefly summarize three such formulations, and discuss them in further detail in the full version [18].444We can also consider joint compression of ciphertexts and secret keys in FE. The focus of this work is only on ciphertext incompressibility as discussed in the full version [18]. It is an interesting open question of whether new tradeoffs and applications can be enabled, if one considers joint incompressibility of ciphertexts and secret keys.
-
Standard security: the adversary receives one (or bounded number of) distinguishing secret key(s), after compressing challenge ciphertext (i.e., in stage 2). Moreover, it receives unbounded number of non-distinguishing secret keys before and after compressing the ciphertext.
-
Semi-strong security: this is a strengthening of standard security, where the adversary can get an unbounded number of distinguishing keys in stage 2.
-
Strong security: this further strengthens as now adversary gets the master secret key in stage 2.
Measuring incompressibility efficiency.
Clearly, for the above to not be trivially impossible, the ciphertext size should be larger than , the incompressibility limit. Further, the ciphertext should be larger than to uniquely encode and guarantee correctness. However, it is not clear if there are any other necessary constraints on parameter sizes, beyond . Here the term ensures both ciphertext constraints (i.e., and ).
Thus, an ideal goal is to design incompressible FE where are all independent of , and . Such an incompressible FE scheme would have asymptotically optimal-sized parameters. As we discuss in the full version [18], achieving optimality in all parameter sizes is unachievable from standard falsifiable assumptions. Therefore, a standard approach in the literature [23, 9] is to design encryption with highest ciphertext-rate. Ciphertext-rate is defined as the ratio of message length and ciphertext length, i.e. .
Prior works [23, 9] built incompressible PKE with optimal -rate of . Unfortunately, that comes at the cost of large secret keys, i.e. . In this work, we design incompressible ABE/FE in two incomparable parameter regimes – -rate of with “large” secret keys, and -rate of with “short” secret keys. We believe both parameter regimes to be equally interesting. In FE applications, where an honest user stores only secret keys and not ciphertexts in its persistent long-term storage, it might be beneficial to have short keys with constant -rate. While, in applications where an honest user stores only a few secret keys and a large number of ciphertexts, having a -rate of might be more useful.
Our results
We summarize our main results below. All our schemes are in the standard model and under standard assumptions. We do not make any ideal-cipher, random oracle, or any other non-standard/non-falsifiable cryptographic assumption.
- Incompressible FE.
-
Our first set of results contains new constructions for incompressible FE for polynomial-sized circuits. We provide three separate and incomparable FE constructions as each provides a unique efficiency-security tradeoff. All three construction rely on a standard public-key FE scheme for polynomial-sized circuits.
-
1.
Our first incompressible FE scheme is proven secure in the semi-strong incompressibility model. If the underlying FE scheme has -rate of , then our incompressible FE scheme has an -rate.
-
2.
Our second scheme is also proven secure in the semi-strong incompressibility model, except we only prove selective security.555Here selective means that the adversary must submit challenge messages before receiving secret keys in stage 1. Moreover, this construction is a -rate preserving construction. That is, we obtain -rate incompressible FE scheme from any -rate standard FE scheme. However, the secret keys are large to avoid known barriers.
-
3.
Our third scheme is an extension of our above scheme. It is proven secure in the selective standard incompressibility model, but it provides a rather non-trivial efficiency guarantee. We prove that if the underlying FE scheme has short keys, then so does our incompressible FE scheme (without lowering the -rate). As we elaborate later in the overview, this does not contradict known implausibility results (see discussion in the full version [18]), but rather tightly matches it.
By plugging in known optimal-ciphertext-rate FE schemes [23, 25], we obtain incompressible FE schemes under the assumption of poly-secure FE with:
-
1.
a -rate-, short keys, and selective semi-strong security,
-
2.
a -rate-, short keys, and adaptive semi-strong security,
-
3.
a -rate-, large keys, and selective semi-strong security,
-
4.
a -rate-, short keys, and selective standard security.
-
1.
- Incompressible ABE.
-
Our second result is an incompressible attribute-based encryption (ABE) scheme for polynomial-sized circuits achieves (standard) incompressible ABE security, with ciphertext size and all other parameter sizes, , are independent of . That is, this scheme has -rate of , and short keys. The construction and security proof are available in the full version [18].
2 Preliminaries and Notations
Throughout this paper, we will use to denote the security parameter and to denote a negligible function in the input. We will use the short-hand notation PPT for “probabilistic polynomial time”. For any finite set , denotes the process of picking an element from uniformly at random. Similarly, for any distribution , denotes an element drawn from the distribution . For any natural number , denotes the set . For any two binary string and , denotes the concatenation of and . We use the following two notations to denote a family of circuits - is a set of families of circuits indexed by some parameter and is a set of families of circuits indexed by the depth of the circuits and the number of inputs to the circuits .
2.1 Randomness Extractors
Definition 1 (Strong Average Min-Entropy Extractor).
A -strong average min-entropy extractor is an efficient function such that for all jointly distributed random variable where takes values and , we have where are uniformly random strings of length respectively. Here is the average min-entropy of conditioned on .
Theorem 2.
There exists an explicit efficient -strong average min-entropy extractor such that , , and the depth of the extractor circuit is .
2.2 Pseudorandom Functions
A family of pseudorandom functions , with key space , input space and output space consists of the following algorithms.
-
The key generation algorithm is a randomized algorithm that takes as input the security parameter and outputs a key .
-
The evaluation algorithm is a deterministic algorithm that takes as input a key and and outputs .
Definition 3.
A PRF scheme is secure if for all PPT adversary , there exists a negligible function such that for all ,
where is the set of all functions from to .
2.3 Garbling Scheme
A garbling scheme for a class of circuits consists of the following algorithms.
-
: The garbling algorithm is a randomized algorithm that takes as input the security parameter and a circuit such that and outputs a garbled circuit and a set of labels .
-
The evaluation algorithm takes as input a garbled circuit and a set of labels and outputs .
Correctness
For correctness of a garbling scheme for a class of circuits , we require that for all , ,
where .
Security
Definition 4.
A garbling scheme for a class of circuits is said to be secure if there exists a PPT algorithm such that for all PPT adversaries , there exists a negligible function such that for all , the following holds.
2.4 Incompressible Secret Key Encryption
An incompressible secret key encryption scheme with message space consists of the following PPT algorithms.
-
The setup algorithm is a randomized algorithm that takes as input the security parameter , a parameter , the length of the message and outputs a secret key .
-
The encryption algorithm is a randomized algorithm that takes as input a secret key and a message and outputs a ciphertext .
-
The decryption algorithm takes as input a secret key and a ciphertext and outputs either a message or .
Correctness
For correctness, we require that for all and ,
where the probability is over the random bits used in the encryption algorithm.
Incompressible SKE Security
Consider the following experiment with an adversary .
-
Initialization Phase: on input , outputs an upper bound on the state size and the length of the message . The challenger runs .
-
Challenge Phase: outputs a message , along with an auxiliary information . The challenger randomly chooses . If , it samples a truly random string . Else, it computes a ciphertext and sends it to .666In the incompressible security definition presented in prior works [9, 24], the adversary sends two messages and receives an encryption of one of these message. Note that this is a weaker notion, which is implied by the incompressible security notion defined in this paper.
-
First Response Phase: computes a state such that .
-
Second Response Phase: receives and outputs . wins the experiment if .
Definition 5.
An SKE scheme is said to be incompressible secure if for all PPT adversaries , there exists a negligible function such that for all ,
CPA-SKE Security
Consider the following experiment with an adversary where algorithm takes only and as input.
-
Initialization Phase: The challenger runs .
-
Pre-Challenge Query Phase: is allowed to make polynomially many queries. For each query , the challenger computes and returns to .
-
Challenge Phase: outputs a message . The challenger randomly chooses . If , it samples a truly random string . Else, it computes a ciphertext and sends it to .777Note that this security notion implies the standard indistinguishability security notion where the adversary sends two messages and receives an encryption of one of the messages.
-
Post-Challenge Query Phase: is allowed to make polynomially many queries. For each query , the challenger computes and returns to .
-
Response Phase: outputs and wins the experiment if .
Definition 6.
An SKE scheme is said to be secure if for all PPT adversaries , there exists a negligible function such that for all ,
Theorem 7 ([14]).
Assuming the existence of one-way functions, there exists an incompressible SKE scheme with secret-key size and ciphertext size where is the size of the message and is the compressibility parameter. The depth of the decryption circuit is .
2.5 Functional Encryption
A functional encryption scheme for the function space consists of the following PPT algorithms.
-
The setup algorithm is a randomized algorithm that takes as input the security parameter and an index and outputs a master public key and a secret key .
-
The key generation algorithm is a randomized algorithm that takes as input the master secret and a function and outputs a secret .
-
The encryption algorithm is a randomized algorithm that takes as input a public key and a message and outputs a ciphertext .
-
The decryption algorithm takes as input a secret key and a ciphertext and outputs either a or .
Correctness
For correctness, we require that for all and ,
where the probability is over the random bits used in the encryption and key generation algorithm.
Adaptive IND-based Security
Consider the following experiment with an adversary .
-
Initialization Phase: The challenger runs and sends to .
-
Pre-Challenge Query Phase: is allowed to make polynomially many queries. For each query , the challenger computes and returns to .
-
Challenge Phase: outputs two message . If there exists a function queried by such that , the challenger aborts the game. Else, it randomly chooses and computes a ciphertext and sends it to .
-
Post-Challenge Query Phase: is allowed to make polynomially many queries. For each query , if , the challenger sends . Else, computes and returns to .
-
Response Phase: outputs . wins the experiment if .
Definition 8.
An FE scheme satisfies adaptive indistinguishability-based security if for all PPT adversaries , there exists a negligible function such that for all ,
If the FE is secure against an unbounded number of queries from the adversary, then we say that the scheme is collision-resistant.
A relaxed notion of the FE indistinguishability-based security is the well-known selective security model. An FE scheme is said to be selectively secure if it is secure against PPT adversaries that do not make any key queries during the pre-challenge query phase, and have to submit the challenge message before obtaining the public parameters.
The following two theorems addresses the optimal ciphertext-rate and secret-key size FE schemes for both adaptive and selective settings. It is important to note that in these FE scheme, the decryption algorithm requires the complete description of the function in addition to the secret key to perform decryption.
Theorem 9 ([25]).
Assuming selectively secure FE for circuits, there exists an adaptively secure FE such that
where hides factors of , is the security parameter, is a ciphertext and is a secret key for the function , is any element from the input space of and is the master public key generated by the scheme.
Theorem 10 ([25]).
Assuming selectively secure FE for circuits, there exists an adaptively secure FE such that
where hides factors of , is the security parameter, is a ciphertext and is a secret key for the function that outputs a single bit, is any element from the input space of and is the master public key generated by the scheme.
Simulation security
Consider the following real and simulated experiment with an adversary where is a PPT simulator.
Real Experiment
-
Initialization Phase: The challenger runs and sends to .
-
Challenge Phase: outputs a message and a function . The challenger computes a ciphertext and and sends to .
-
Response Phase: outputs .
Simulated Experiment
-
Initialization Phase: The simulator runs and sends to .
-
Challenge Phase: outputs a message and a function . The simulator computes and sends to .
-
Response Phase: outputs .
Definition 11.
An FE scheme is said to be single-key simulation secure if for all PPT adversaries , there exists a PPT simulator and a negligible function such that for all ,
Theorem 12 ([16]).
Assuming the hardness of , there exists a single-key simulation secure for a class of circuits that takes input of size , outputs a single bit and has depth such that
where hides factors of , is the security parameter, is a ciphertext and is a secret key for the circuit and is the master public key generated by the scheme.
Corollary 13.
Assuming the hardness of , there exists a single-key simulation secure for a class of circuits that takes input of size , outputs -bits and has depth such that
where hides factors of , is the security parameter, is a ciphertext and is a secret key for the circuit and is the master public key generated by the scheme.
Specializing FE
An attribute based encryption scheme (ABE) is a function encryption scheme where the message space is , i.e., it is a tuple of a message and an attribute and the function class is a set of function such that any function is associated with a predicate function with the following definition.
In the security experiment, the adversary has to output in the challenge phase with the restriction that it has never queried a key for a function such that .
Theorem 14 ([6]).
Assuming the hardness of , there exists an selectively secure ABE scheme for any family of circuits that has -length input and -depth satisfying
where hides factors of , is the security parameter, is a ciphertext and is a secret key for the predicate and is the master public key generated by the scheme.
An identity based encryption scheme (IBE) is a attribute based encryption scheme where the message space is , i.e., it is a tuple of a message and an identity and the function class is a set of function such that any function is associated with an identity with the following definition.
In the security experiment, the adversary has to output in the challenge phase with the restriction that it has never queried a key for .
3 Incompressible Functional Encryption: Definitions
In this section, we will proceed to define the incompressible version of the security game for FE scheme where takes an additional input . Similar to the incompressible SKE schemes, we will consider two adversaries . The first adversary will be provided with the complete challenge ciphertext and produce a compressed version of it. The second adversary is provided with the master public key, compressed challenge ciphertext which was created by and certain secret keys.
Definition 15 (Incompressible FE Security).
Let be an FE scheme in which the setup algorithm takes an additional parameter as input. Consider the following experiment with an adversary .
-
Initialization Phase: on input , outputs an upper bound on the state size and . The challenger runs and sends to .
-
Pre-Challenge Query Phase: In this phase, is allowed to make polynomially many key queries. For each query sent to the challenger, the challenger computes and returns to .
-
Challenge Phase: outputs two messages , along with an auxiliary information . If there exists a function queried by such that , the challenger aborts the game. Else, it randomly chooses and computes a ciphertext and sends it to .
-
Post-Challenge Query Phase: This is similar to the pre-challenge query phase. The adversary is allowed to send polynomially many key queries. For each query , if , the challenger sends . Else, computes and returns to .
-
First Response Phase: computes a state such that .
-
Second Response Phase: receives and can make the following query.
-
–
Key Query Phase: In this phase, is allowed to make a single distinguishing key query but polynomially many queries for non-distinguishing keys. The challenger computes and returns to .
Finally, outputs . wins the experiment if .
-
–
An FE scheme is said to be incompressible secure if for all PPT adversaries , there exists a negligible function such that for all ,
We consider two stronger variants of the above security - strongly incompressible and semi-strongly incompressible. In the strongly incompressible version, is provided with the master secret whereas in the semi-strongly incompressible version, it is allowed to make polynomially many distinguishing key queries.
Definition 16 (Strongly Incompressible Security).
An FE scheme is said to be strongly incompressible secure if for all PPT adversaries , there exists a negligible function such that for all ,
provided the second adversary is also given the master secret key at the beginning of Second Response Phase.
Definition 17 (Semi-Strongly Incompressible Security).
An FE scheme is said to be semi-strongly incompressible secure if for all PPT adversaries , there exists a negligible function such that for all ,
provided the second adversary is allowed to make polynomially many distinguishing key queries in the Key Query Phase.
We can consider similar incompressible security notions for IBE and ABE schemes.
4 Rate- Incompressible FE with Short Keys and Semi-Strong Security
In this section, we present a semi-strong incompressible FE scheme, using a regular FE scheme along with an incompressible SKE and regular SKE scheme. If the underlying FE has -rate of , then our incompressible FE scheme has an -rate.
Our Construction
Our FE scheme supports functions from the class such that any function in this class has a depth circuit using the following primitives. Throughout denotes the (in)compressibility parameter.
-
be an incompressible SKE. We define as the length of the secret key of this scheme and as the length of the ciphertext for a message of length encrypted using this scheme.
-
be an SKE scheme with secret keys of length .
-
be an FE scheme with message spaces and function space that contains the decryption circuits of and .
Let be the lexicographically smallest functionality index such that contains , the decryption circuit of and . We describe the algorithms for our incompressible FE scheme below.
-
The setup algorithm samples a master public key and a master secret key of the FE scheme by computing . It generates a secret key of the incompressible SKE scheme by computing and two secret keys of the SKE scheme by computing and . It sets and .
-
Let . The key generation algorithm first computes ciphertext and . Then, it generates a key of the FE scheme by computing where the function is described in Figure 1.
Input: Messages , SKE key , incompressible ciphertext and a flag Hardwired: Function , two SKE ciphertexts Output: 1. Check if If yes, output . 2. Otherwise, compute . 3. Check if If yes, output . 4. Otherwise, compute . 5. Output . Figure 1: Description of . -
Let . The encryption algorithm randomly samples and generates 101010By , we mean it sets a null secret key.. It returns .
-
Let . The decryption algorithm decrypts the ciphertext by computing . It returns .
Correctness
A ciphertext corresponding to a message in the above scheme is an encryption of using the FE scheme, i.e., where is a truly random string.
Consider that a decryptor possesses the secret key for some function . The secret key is a key of the underlying FE scheme for the circuit which takes as input in and outputs if . The decryption algorithm simply computes the decryption algorithm of the underlying FE scheme on the ciphertext using and returns the output. Since, is set to in the ciphertext , decrypting using gives due to the correctness of the underlying FE scheme.
Size of the master public key
The master public key of our scheme is . Therefore, the size is .
Size of the ciphertext
Recall that the ciphertext is an FE encryption of where the third component has size . From the definition of , it is the length of an incompressible ciphertext which is intended encrypt an SKE secret key, therefore, using Dziembowski’s construction (see Theorem 7). So, the size of is . Assuming that has -rate of , the size of is also . Therefore, the rate of the proposed scheme is
Size of the secret keys
The size of the secret key associated with a function is where is an FE secret key for the circuit . To use this secret key, the decryption algorithm would require the entire description of (see Theorem 9 and Theorem 10).
In addition to the description of and the decryption circuits of and , the circuit contains two SKE ciphertexts generated during the key generation process. Therefore, should contain both an FE secret key for the circuit and the two ciphertexts . The first SKE ciphertext is an encryption of an incompressible SKE scheme’s secret key along with a bit , and the second is just a bit . Using Dzeimbowski’s construction (see Theorem 7), we have . Therefore, is the size of an FE secret key associated with , with an additional .
Theorem 18.
Assuming is an -rate- adaptively (selectively) secure FE scheme, is a secure SKE scheme against unbounded number of ciphertexts and be a secure incompressible SKE scheme, then the above construction is an adaptively (selectively) secure semi-strongly incompressible FE scheme. Also,
Proof-Sketch.
The proof proceeds via a sequence of hybrid experiments.
-
: This corresponds to the adaptive semi-strong incompressibility security game. The adversary first receives the master public key . It queries for polynomially many non-distinguishing keys, and receives the corresponding secret keys. Then, it sends its challenge messages and receives the challenge ciphertext which is encryption of . Again, the adversary queries for polynomially many non-distinguishing keys, and receives the corresponding secret keys. It then compresses its state, and queries for both distinguishing and non-distinguishing functions. Upon receiving the secret keys, it must guess which message was encrypted.
-
In this hybrid, the challenger keeps the challenge ciphertext same as before, but modifies the distinguishing secret keys. For every distinguishing key query for some function , it encrypts instead of to generate .
Note that and are indistinguishable due to SKE security. This is because the attacker does not get access to the SKE secret key, except in the form of ciphertexts as part of functional secret keys. We highlight we know the value because the adversary is allowed to make distinguishing key queries in the second phase only.
-
In this hybrid, the challenger generates by encrypting instead of sampling a truly random string. The rest of the game proceeds as before.
Indistinguishability of hybrids and follows from standard indistinguishability-based security of the incompressible SKE scheme. This is because the secret key is used only during the generation of .
-
In this hybrid experiment, the challenger keeps the challenge ciphertext same as before, but modifies the distinguishing secret keys. For every distinguishing key query for some function , it encrypts instead of to generate .
Note that and are indistinguishable due to SKE security. This is because the attacker does not get access to the SKE secret key, except in the form of ciphertexts as part of functional secret keys.
-
In this hybrid, the challenger modifies the challenge ciphertext by encrypting instead of . The rest of the game proceeds as before.
Indistinguishability of hybrids and follows from adaptive indistinguishability-based security of FE, as the output of the function stays the same for all key queries. This is because in , the non-distinguishing keys would decrypt the challenge ciphertext to (since is set to and ), which is equal to . Whereas, the distinguishing keys would decrypt to (since is set to and , see Figure 1).
-
In this hybrid, the challenger reverts to generating by sampling a truly random string. The rest of the game proceeds as before.
Indistinguishability of hybrids and follows from the incompressible indistinguishability-based security of the incompressible SKE scheme. This is because the information is needed to generate distinguishing keys in the second phase.
Finally, note that in , the bit is used only in the second phase while generating distinguishing keys. That is, is generated by encrypting . Therefore, the winning probability for any adversary in depends on the standard indistinguishability-based security of the regular SKE scheme.
The proof for the above theorem is provided in the full version [18]. Using Theorem 9, we have the following corollary.
Corollary 19.
Assuming the existence of selectively secure FE for circuits, there exists a -rate- adaptively secure semi-strongly incompressible FE scheme for circuits. Also,
Using Theorem 10, we have the following corollary.
Corollary 20.
Assuming the existence of selectively secure FE for circuits, there exists a -rate- selectively secure semi-strongly incompressible FE scheme for circuits. Also,
5 Rate- Incompressible FE with Large Keys and Semi-Strong Security
In this section, we present a selective semi-strong incompressible FE scheme, using a (regular) public key FE, together with other standard cryptographic primitives. If the underlying FE scheme has -rate-1, then our incompressible FE scheme also has -rate-1. Although the functional key sizes are larger.
Our construction
For simplicity, we consider boolean-valued functions. To design an incompressible FE supporting function class , we use the following primitives. Throughout denotes the (in)compressibility parameter.
-
be a strong average-min entropy randomness extractor, where and .
-
be an SKE scheme that can encrypt messages of length . (Here is the FE message length and is the seed length. W.l.o.g., we assume the secret key length to be .)
-
be an FE scheme with message spaces and function space .
Let . We require the function class to be such that it contains , and the decryption circuit of and extractor .
We describe the algorithms for our incompressible FE scheme below.
-
Let . The setup algorithm samples a master public and secret key of the FE scheme by sampling . It also samples an SKE secret key . It sets and .
-
Parse master key as . The key generation algorithm first computes ciphertext . That is, it encrypts zeros. Then, it generates an FE secret key by computing , where is described in Figure 2.
Input: , an SKE secret key , bit . Hardwired: Function , an SKE ciphertext . Output: . 1. Check if If yes, parse as an -bit message , and output . That is, if , then , else . 2. Otherwise, compute . Here . 3. Check if If yes, then output first bit of , i.e. . 4. Otherwise, parse as an -bit source , and output . That is, if , then set , else set . Then compute message and output . Figure 2: Description of . -
The encryption algorithm generates the ciphertext by computing . It outputs . (We point out that the message is padded to be of length in case . Also, by , we mean it sets a null secret key.)
-
The decryption algorithm decrypts the ciphertext by computing . It returns .
Correctness
Follows immediately from the construction.
Size of the master public key
The master public key of our scheme is . Therefore, the size is .
Size of the ciphertext
The size of the message encrypted by is . Now if the base FE scheme has -rate-1, then ciphertext size in our scheme is also .
Size of the secret key
The size of the secret key associated with a function is where is an FE secret key for the circuit . To use this secret key, the decryption algorithm would require the entire description of (see Theorem 10).
In addition to the description of and the decryption circuit of , the circuit contains an SKE ciphertext generated during the key generation process. So, should contain both an FE secret key for the circuit and the ciphertext . The SKE ciphertext is an encryption of a message of length where is the seed length of the extractor111111 is equal to , see Theorem 2 and is the length of the message. Therefore, is equal to plus the size of an FE secret key associated with .
Theorem 21.
Assuming is IND-CPA secure, is a selectively secure FE with -rate-, then the above FE construction is a selective semi-strong incompressible FE scheme. Also,
Proof-Sketch.
The proof proceeds via a sequence of hybrid experiments.
-
: This corresponds to the selective semi-strong incompressibility security game. The adversary first sends its challenge messages and receives the challenge ciphertext which is encryption of . Next, the adversary queries for polynomially many non-distinguishing keys, and receives the corresponding secret keys. It then compresses its state, and queries for both distinguishing and non-distinguishing functions. Upon receiving the secret keys, it must guess which message was encrypted.
-
In this hybrid, the challenger keeps the challenge ciphertext same as before, but modifies the secret keys. During setup, the challenger samples a single random string as the extractor source, and a single random string as the extractor seed. Now, instead of using an SKE encryption of within each secret key, the challenger does the following:
-
–
For every non-distinguishing key query for some function , it encrypts . That is, the second message bit is and rest are still all zeros.
-
–
For every distinguishing key query for some function , it sets , and computes the SKE ciphertext as to be an encryption of .
Note that and are indistinguishable due to SKE security. This is because the attacker does not get access to the SKE secret key, except in the form of ciphertexts as part of functional secret keys. We highlight that since we need to know to answer even a non-distinguishing key query, thus we can only prove selective security of our incompressible FE scheme.
-
–
-
In this hybrid, the challenger encrypts instead of . (Note that here we are overloading notation and consider that there is a fixed deterministic way, e.g. by padding, to write and as -bit strings.) The rest of the game proceeds as before.
Indistinguishability of hybrids and follows standard selective indistinguishability-based security of FE, as the output of the function stays the same for all key queries. This is because for non-distinguishing keys we know that , while for non-distinguishing keys, the function output is still .
-
In this hybrid experiment, is chosen uniformly at random (instead of setting it as . Using the strong extractability guarantee of the extractor, we can argue that and are negligibly close.
Finally, note that the bit is not used in , and therefore the adversary has no advantage in this experiment.
The detailed proof for the above theorem is provided in the full version [18]. Using Theorem 10, we have the following corollary.
Corollary 22.
Assuming the existence of -rate- selectively secure FE for circuits, there exists a -rate- selectively secure semi-strongly incompressible FE scheme for circuits. Also,
6 Rate- Incompressible FE with Short Keys and Standard Security
In this section, we present a selective (standard) incompressible FE scheme, using a (regular) public key FE, together with other standard cryptographic primitives. If the underlying FE scheme has -rate-1, then our incompressible FE scheme also has -rate-1. Interestingly, we show that if the underlying FE scheme has short keys, then our resulting incompressible FE scheme has short keys as well. While it might seem to contradict the lower bound [3], we observe that since we only prove standard incompressibility security (where only one non-distinguishing key gets corrupted) and the functions supported by our FE scheme has single-bit output, thus this does not contradict the result. This is because the lower bound actually states that if an incompressible FE scheme has -rate-1, then the size of the functional secret key must grow with the output length of the function, and not necessarily the input/message length.
Our construction
As discussed in the overview, this construction relies on the same ingredients as our FE construction from Section 5. The core difference is that now the functions that we create secret keys for change slightly. Below we describe the algorithms where we make modifications, and underline all the changes.
-
This is the same as in Section 5.
-
Parse master key as . The key generation algorithm first computes ciphertext . That is, it encrypts zeros. Then, it generates an FE secret key by computing , where is described in Figure 3.
Input: , an SKE secret key , bit . Hardwired: Function , an SKE ciphertext . Output: . 1. Check if If yes, parse as an -bit message , and output . 2. Otherwise, compute . Here . 3. Check if If yes, then output first bit of , i.e. . 4. Otherwise, parse as an -bit source , and output . That is, it no longer computes in this case. Figure 3: Description of . -
The encryption and decryption algorithms are the same as in Section 5.
Correctness
Follows immediately from the construction.
Size of the master public key and ciphertext
This is the same as in Section 5.
Size of the secret key
The size of the secret key associated with a function is where is an FE secret key for the circuit . To use this secret key, the decryption algorithm would require the entire description of (see Theorem 10).
In addition to the description of and the decryption circuit of , the circuit contains an SKE ciphertext generated during the key generation process. So, should contain both an FE secret key for the circuit and the ciphertext . The SKE ciphertext is an encryption of a message of length where is the seed length of the extractor121212 is equal to , see Theorem 2. Therefore, is the size of an FE secret key associated with , with an addition .
Theorem 23.
Assuming is IND-CPA secure, is a selectively secure FE with -rate-, then the above FE construction is a selective (standard) incompressible FE scheme. Also,
Proof-Sketch.
The proof is very similar to the security proof of Theorem 21, except with one change. Since we only prove standard incompressibility of our FE scheme, then we only need to answer a single distinguishing key query. Therefore, rather than programming as as in the previous proof, we simply program . That is, we only hardwire one function value inside rather than the full message . Because of this change, we can only prove standard incompressibility security (because we cannot answer more than one non-distinguishing key), but the circuit (that we have to create a functional key for) now has a succinct description as it only needs and (which is short anyways). For completeness, we sketch the hybrids below.
-
: This corresponds to the selective standard incompressibility security game. The adversary first sends its challenge messages and receives the challenge ciphertext which is encryption of . Next, the adversary queries for polynomially many non-distinguishing keys, and receives the corresponding secret keys. It then compresses its state, and queries for one distinguishing function and many non-distinguishing functions. Upon receiving the secret keys, it must guess which message was encrypted.
-
In this hybrid, the challenger keeps the challenge ciphertext same as before, but modifies the secret keys. During setup, the challenger samples a single random string as the extractor source, and a random string as the extractor seed. Now, instead of using an SKE encryption of within each secret key, the challenger does the following:
-
–
For every non-distinguishing key query for some function , it encrypts . That is, the second message bit is and rest are still all zeros.
-
–
For distinguishing key query , it sets , and computes the SKE ciphertext as to be an encryption of .
-
–
-
In this hybrid, the challenger encrypts instead of . The rest of the game proceeds as before.
-
In this hybrid experiment, is chosen uniformly at random (instead of setting it as .
Finally, note that the bit is not used in , and therefore the adversary has no advantage in this experiment.
The detailed proof for the above theorem is provided in the full version [18]. Using Theorem 10, we have the following corollary.
Corollary 24.
Assuming the existence of -rate- selectively secure FE for circuits, there exists a -rate- selectively secure regular incompressible FE scheme for circuits. Also,
Remark 25 (Handling functions with longer outputs, or a fixed number of distinguishing keys).
The above FE construction can be naturally extended to support functions with longer outputs, or a fixed number of distinguishing keys. The idea is quite simply to hardwire either the multi-bit function output (in the first case) or the function output for every distinguishing function (in the second case). Note that if the secret keys for the underlying FE scheme are short (independent of the function description), then the above scheme achieves incompressible FE with optimal ciphertexts as well as secret keys.
References
- [1] Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Foundations of garbled circuits. In CCS ’12, 2012. doi:10.1145/2382196.2382279.
- [2] John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pages 321–334, 2007. doi:10.1109/SP.2007.11.
- [3] Kaartik Bhushan, Rishab Goyal, Venkata Koppula, Varun Narayanan, Manoj Prabhakaran, and Mahesh Sreekumar Rajasree. Leakage-resilient incompressible cryptography: Constructions and barriers. In Advances in Cryptology–ASIACRYPT, 2024.
- [4] Nir Bitansky and Tomer Solomon. Bootstrapping homomorphic encryption via functional encryption. In Yael Tauman Kalai, editor, 14th Innovations in Theoretical Computer Science Conference, ITCS 2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, USA, volume 251 of LIPIcs, pages 17:1–17:23. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPIcs.ITCS.2023.17.
- [5] Dan Boneh and Matthew K. Franklin. Identity-based encryption from the weil pairing. In CRYPTO, 2001.
- [6] Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, and Dhinakaran Vinayagamurthy. Fully key-homomorphic encryption, arithmetic circuit abe and compact garbled circuits. In Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings 33, pages 533–556. Springer, 2014. doi:10.1007/978-3-642-55220-5_30.
- [7] Dan Boneh, Amit Sahai, and Brent Waters. Functional encryption: definitions and challenges. In TCC, 2011.
- [8] Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on encrypted data. In TCC, 2007.
- [9] Pedro Branco, Nico Döttling, and Jesko Dujmović. Rate-1 Incompressible Encryption from Standard Assumptions. In Eike Kiltz and Vinod Vaikuntanathan, editors, Theory of Cryptography, Lecture Notes in Computer Science, pages 33–69, Cham, 2022. Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_2.
- [10] Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, and Antigoni Polychroniadou. Laconic oblivious transfer and its applications. In Jonathan Katz and Hovav Shacham, editors, Advances in Cryptology – CRYPTO 2017 – 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II, volume 10402 of Lecture Notes in Computer Science, pages 33–65. Springer, 2017. doi:10.1007/978-3-319-63715-0_2.
- [11] Clifford Cocks. An identity based encryption scheme based on Quadratic Residues. In Cryptography and Coding, IMA International Conference, volume 2260 of LNCS, pages 360–363, 2001. doi:10.1007/3-540-45325-3_32.
- [12] Whitfield Diffie and Martin E. Hellman. New directions in cryptography, 1976.
- [13] Nico Döttling, Phillip Gajland, and Giulio Malavolta. Laconic function evaluation for turing machines. In Alexandra Boldyreva and Vladimir Kolesnikov, editors, Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II, volume 13941 of Lecture Notes in Computer Science, pages 606–634. Springer, 2023. doi:10.1007/978-3-031-31371-4_21.
- [14] Stefan Dziembowski. On Forward-Secure Storage. In Cynthia Dwork, editor, Advances in Cryptology – CRYPTO 2006, Lecture Notes in Computer Science, pages 251–270, Berlin, Heidelberg, 2006. Springer. doi:10.1007/11818175_15.
- [15] Sanjam Garg, Omkant Pandey, and Akshayaram Srinivasan. Revisiting the cryptographic hardness of finding a nash equilibrium. In Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology – CRYPTO 2016 – 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, volume 9815 of Lecture Notes in Computer Science, pages 579–604. Springer, 2016. doi:10.1007/978-3-662-53008-5_20.
- [16] Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, and Nickolai Zeldovich. Reusable garbled circuits and succinct functional encryption. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 555–564, 2013.
- [17] Sergey Gorbunov, Vinod Vaikuntanathan, and Hoeteck Wee. Predicate encryption for circuits from LWE. In Rosario Gennaro and Matthew Robshaw, editors, Advances in Cryptology – CRYPTO 2015 – 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, volume 9216 of Lecture Notes in Computer Science, pages 503–523. Springer, 2015. doi:10.1007/978-3-662-48000-7_25.
- [18] Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree, and Aman Verma. Incompressible functional encryption. Cryptology ePrint Archive, Paper 2024/798, 2024. URL: https://eprint.iacr.org/2024/798.
- [19] Rishab Goyal, Venkata Koppula, Andrew Russell, and Brent Waters. Risky traitor tracing and new differential privacy negative results. In Hovav Shacham and Alexandra Boldyreva, editors, Advances in Cryptology – CRYPTO 2018 – 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I, volume 10991 of Lecture Notes in Computer Science, pages 467–497. Springer, 2018. doi:10.1007/978-3-319-96884-1_16.
- [20] Rishab Goyal, Venkata Koppula, and Brent Waters. Lockable obfuscation. In 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, pages 612–621, 2017. doi:10.1109/FOCS.2017.62.
- [21] Rishab Goyal, Venkata Koppula, and Brent Waters. Collusion resistant traitor tracing from learning with errors. In Ilias Diakonikolas, David Kempe, and Monika Henzinger, editors, Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018, Los Angeles, CA, USA, June 25-29, 2018, pages 660–670. ACM, 2018. doi:10.1145/3188745.3188844.
- [22] Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati, editors, Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 – November 3, 2006, pages 89–98. ACM, 2006. doi:10.1145/1180405.1180418.
- [23] Jiaxin Guan, Daniel Wichs, and Mark Zhandry. Incompressible Cryptography. In Orr Dunkelman and Stefan Dziembowski, editors, Advances in Cryptology – EUROCRYPT 2022, Lecture Notes in Computer Science, pages 700–730, Cham, 2022. Springer International Publishing. doi:10.1007/978-3-031-06944-4_24.
- [24] Jiaxin Guan, Daniel Wichs, and Mark Zhandry. Multi-instance randomness extraction and security against bounded-storage mass surveillance. In Theory of Cryptography Conference, pages 93–122. Springer, 2023. doi:10.1007/978-3-031-48621-0_4.
- [25] Aayush Jain, Huijia Lin, and Ji Luo. On the optimal succinctness and efficiency of functional encryption and attribute-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 479–510. Springer, 2023. doi:10.1007/978-3-031-30620-4_16.
- [26] Aayush Jain, Huijia Lin, and Amit Sahai. Indistinguishability obfuscation from well-founded assumptions. In STOC, 2021.
- [27] Aayush Jain, Huijia Lin, and Amit Sahai. Indistinguishability obfuscation from lpn over f p, dlin, and prgs in nc 0. In Advances in Cryptology–EUROCRYPT 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30–June 3, 2022, Proceedings, Part I, pages 670–699. Springer, 2022.
- [28] Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPT, 2008.
- [29] Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, and Daniel Wichs. Hardness of non-interactive differential privacy from one-way functions, 2018.
- [30] Adam O’Neill. Definitional issues in functional encryption. Cryptology ePrint Archive, Report 2010/556, 2010.
- [31] Willy Quach, Hoeteck Wee, and Daniel Wichs. Laconic function evaluation and applications. In Mikkel Thorup, editor, 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, pages 859–870. IEEE Computer Society, 2018. doi:10.1109/FOCS.2018.00086.
- [32] Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457–473, 2005. doi:10.1007/11426639_27.
- [33] Adi Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO, 1984.
- [34] Daniel Wichs and Giorgos Zirdelis. Obfuscating compute-and-compare programs under LWE. In 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, pages 600–611, 2017. doi:10.1109/FOCS.2017.61.
- [35] Andrew Yao. How to generate and exchange secrets. In FOCS, 1986.
