Abstract
In a Multi-Client Functional Encryption (MCFE) scheme, n clients each obtain a secret encryption key from a trusted authority. During each time step t, each client i can encrypt its data using its secret key. The authority can use its master secret key to compute a functional key given a function f, and the functional key can be applied to a collection of n clients’ ciphertexts encrypted to the same time step, resulting in the outcome of f on the clients’ data. In this paper, we focus on MCFE for inner-product computations.
If an MCFE scheme hides not only the clients’ data, but also the function f, we say it is function hiding. Although MCFE for inner-product computation has been extensively studied, how to achieve function privacy is still poorly understood. The very recent work of Agrawal et al. showed how to construct a function-hiding MCFE scheme for inner-product assuming standard bilinear group assumptions; however, they assume the existence of a random oracle and prove only a relaxed, selective security notion. An intriguing open question is whether we can achieve function-hiding MCFE for inner-product without random oracles.
In this work, we are the first to show a function-hiding MCFE scheme for inner products, relying on standard bilinear group assumptions. Further, we prove adaptive security without the use of a random oracle. Our scheme also achieves succinct ciphertexts, that is, each coordinate in the plaintext vector encrypts to only O(1) group elements.
Our main technical contribution is a new upgrade from single-input functional encryption for inner-products to a multi-client one. Our upgrade preserves function privacy, that is, if the original single-input scheme is function-hiding, so is the resulting multi-client construction. Further, this new upgrade allows us to obtain a conceptually simple construction.
N. Vanjani—Author ordering is randomized.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Throughout this paper, the term “inner-product encryption” always means “inner-product functional encryption”. This terminology is standard in this space.
- 2.
In Appendix E of the online full version, we show that a variant of the strawman scheme can indeed be proven secure in a different selective model, i.e., the adversary must submit all encryption queries ahead of \(\textbf{KGen} \) queries. However, we do not know any easy way to build from this selective scheme and get adaptive security eventually.
- 3.
For convenience, we may imagine that the labels t have been renamed to be the integers \(\{1, 2, \ldots , Q_\textrm{enc}\}\).
References
Abdalla, M., Benhamouda, F., Gay, R.: From single-input to multi-client inner-product functional encryption. In: Asiacrypt (2019)
Abdalla, M., Benhamouda, F., Kohlweiss, M., Waldner, H.: Decentralizing inner-product functional encryption. In: PKC, vol. 11443, pp. 128–157 (2019)
Abdalla, M., Bourse, F., De Caro, A., Pointcheval, D.: Simple functional encryption schemes for inner products. In: PKC (2015)
Abdalla, M., Bourse, F., Marival, H., Pointcheval, D., Soleimanian, A., Waldner, H.: Multi-client inner-product functional encryption in the random-oracle model. In: SCN (2020)
Abdalla, M., Catalano, D., Fiore, D., Gay, R., Ursu, B.: Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings. In: CRYPTO (2018)
Abdalla, M., Gay, R., Raykova, M., Wee, H.: Multi-input inner-product functional encryption from pairings. In: EUROCRYPT (2017)
Abdalla, M., Pointcheval, D., Soleimanian, A.: 2-step multi-client quadratic functional encryption from decentralized function-hiding inner-product. Cryptology ePrint Archive (2021)
Agrawal, S., Clear, M., Frieder, O., Garg, S., O’Neill, A., Thaler, J.: Ad hoc multi-input functional encryption. In: ITCS (2020)
Agrawal, S., Goyal, R., Tomida, J.: Multi-input quadratic functional encryption from pairings. In: CRYPTO (2021)
Agrawal, S., Goyal, R., Tomida, J.: Multi-party functional encryption. In: TCC (2021)
Ananth, P., Jain, A., Sahai, A.: Indistinguishability obfuscation from functional encryption for simple functions. Cryptology ePrint Archive (2015)
Bellare, M., Ristenpart, T.: Simulation without the artificial abort: Simplified proof and improved concrete security for waters’ IBE scheme. In: Eurocrypt (2009)
Bitansky, N., Vaikuntanathan, V.: Indistinguishability obfuscation from functional encryption. J. ACM 65(6), 1–37 (2018)
Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: CCS (2017)
Chotard, J., Dufour Sans, E., Gay, R., Phan, D.H., Pointcheval, D.: Decentralized multi-client functional encryption for inner product. In: ASIACRYPT (2018)
Chotard, J., Dufour Sans, E., Gay, R., Phan, D.H., Pointcheval, D.: Multi-client functional encryption with repetition for inner product. Cryptology ePrint (2018)
Chotard, J., Dufour Sans, E., Gay, R., Phan, D.H., Pointcheval, D.: Dynamic decentralized functional encryption. In: CRYPTO (2020)
Escala, A., Herold, G., Kiltz, E., Rafols, C., Villar, J.L.: An algebraic framework for Diffie-Hellman assumptions. In: CRYPTO (2013)
Goldwasser, S., et al.: Multi-input functional encryption. In: Eurocrypt (2014)
Jager, T.: Verifiable random functions from weaker assumptions. In: TCC (2015)
Kitagawa, F., Nishimaki, R., Tanaka, K.: Obfustopia built on secret-key functional encryption. In: EUROCRYPT (2018)
Libert. B., Titiu, R.: Multi-client functional encryption for linear functions in the standard model from LWE. In: ASIACRYPT (2019)
Lin, H.: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs. In: CRYPTO (2017)
McMahan, B., Ramage, D.: Federated learning: collaborative machine learning without centralized training data (2017)
Nguyen, K., Phan, D.H., Pointcheval, D.: Multi-client functional encryption with fine-grained access control. In: ASIACRYPT (2023)
Shi, E., Chan, T.-H.H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: NDSS (2011)
Shi, E., Wu, K.: Non-interactive anonymous router. In: Eurocrypt (2021)
Tomida, J.: Tightly secure inner product functional encryption: multi-input and function-hiding constructions. Theoret. Comput. Sci. 833, 56–86 (2020)
Ünal, A.: Impossibility results for lattice-based functional encryption schemes. In: Eurocrypt, pp. 169–199 (2020)
Waters, B.: Efficient identity-based encryption without random oracles. In: Eurocrypt (2005)
Wee, H.: New techniques for attribute-hiding in prime-order bilinear groups. Manuscript (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 International Association for Cryptologic Research
About this paper
Cite this paper
Shi, E., Vanjani, N. (2023). Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. In: Boldyreva, A., Kolesnikov, V. (eds) Public-Key Cryptography – PKC 2023. PKC 2023. Lecture Notes in Computer Science, vol 13940. Springer, Cham. https://doi.org/10.1007/978-3-031-31368-4_22
Download citation
DOI: https://doi.org/10.1007/978-3-031-31368-4_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-31367-7
Online ISBN: 978-3-031-31368-4
eBook Packages: Computer ScienceComputer Science (R0)