Skip to main content

Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles

  • Conference paper
  • First Online:
Public-Key Cryptography – PKC 2023 (PKC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13940))

Included in the following conference series:

Abstract

In a Multi-Client Functional Encryption (MCFE) scheme, n clients each obtain a secret encryption key from a trusted authority. During each time step t, each client i can encrypt its data using its secret key. The authority can use its master secret key to compute a functional key given a function f, and the functional key can be applied to a collection of n clients’ ciphertexts encrypted to the same time step, resulting in the outcome of f on the clients’ data. In this paper, we focus on MCFE for inner-product computations.

If an MCFE scheme hides not only the clients’ data, but also the function f, we say it is function hiding. Although MCFE for inner-product computation has been extensively studied, how to achieve function privacy is still poorly understood. The very recent work of Agrawal et al. showed how to construct a function-hiding MCFE scheme for inner-product assuming standard bilinear group assumptions; however, they assume the existence of a random oracle and prove only a relaxed, selective security notion. An intriguing open question is whether we can achieve function-hiding MCFE for inner-product without random oracles.

In this work, we are the first to show a function-hiding MCFE scheme for inner products, relying on standard bilinear group assumptions. Further, we prove adaptive security without the use of a random oracle. Our scheme also achieves succinct ciphertexts, that is, each coordinate in the plaintext vector encrypts to only O(1) group elements.

Our main technical contribution is a new upgrade from single-input functional encryption for inner-products to a multi-client one. Our upgrade preserves function privacy, that is, if the original single-input scheme is function-hiding, so is the resulting multi-client construction. Further, this new upgrade allows us to obtain a conceptually simple construction.

N. Vanjani—Author ordering is randomized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Throughout this paper, the term “inner-product encryption” always means “inner-product functional encryption”. This terminology is standard in this space.

  2. 2.

    In Appendix E of the online full version, we show that a variant of the strawman scheme can indeed be proven secure in a different selective model, i.e., the adversary must submit all encryption queries ahead of \(\textbf{KGen} \) queries. However, we do not know any easy way to build from this selective scheme and get adaptive security eventually.

  3. 3.

    For convenience, we may imagine that the labels t have been renamed to be the integers \(\{1, 2, \ldots , Q_\textrm{enc}\}\).

References

  1. Abdalla, M., Benhamouda, F., Gay, R.: From single-input to multi-client inner-product functional encryption. In: Asiacrypt (2019)

    Google Scholar 

  2. Abdalla, M., Benhamouda, F., Kohlweiss, M., Waldner, H.: Decentralizing inner-product functional encryption. In: PKC, vol. 11443, pp. 128–157 (2019)

    Google Scholar 

  3. Abdalla, M., Bourse, F., De Caro, A., Pointcheval, D.: Simple functional encryption schemes for inner products. In: PKC (2015)

    Google Scholar 

  4. Abdalla, M., Bourse, F., Marival, H., Pointcheval, D., Soleimanian, A., Waldner, H.: Multi-client inner-product functional encryption in the random-oracle model. In: SCN (2020)

    Google Scholar 

  5. Abdalla, M., Catalano, D., Fiore, D., Gay, R., Ursu, B.: Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings. In: CRYPTO (2018)

    Google Scholar 

  6. Abdalla, M., Gay, R., Raykova, M., Wee, H.: Multi-input inner-product functional encryption from pairings. In: EUROCRYPT (2017)

    Google Scholar 

  7. Abdalla, M., Pointcheval, D., Soleimanian, A.: 2-step multi-client quadratic functional encryption from decentralized function-hiding inner-product. Cryptology ePrint Archive (2021)

    Google Scholar 

  8. Agrawal, S., Clear, M., Frieder, O., Garg, S., O’Neill, A., Thaler, J.: Ad hoc multi-input functional encryption. In: ITCS (2020)

    Google Scholar 

  9. Agrawal, S., Goyal, R., Tomida, J.: Multi-input quadratic functional encryption from pairings. In: CRYPTO (2021)

    Google Scholar 

  10. Agrawal, S., Goyal, R., Tomida, J.: Multi-party functional encryption. In: TCC (2021)

    Google Scholar 

  11. Ananth, P., Jain, A., Sahai, A.: Indistinguishability obfuscation from functional encryption for simple functions. Cryptology ePrint Archive (2015)

    Google Scholar 

  12. Bellare, M., Ristenpart, T.: Simulation without the artificial abort: Simplified proof and improved concrete security for waters’ IBE scheme. In: Eurocrypt (2009)

    Google Scholar 

  13. Bitansky, N., Vaikuntanathan, V.: Indistinguishability obfuscation from functional encryption. J. ACM 65(6), 1–37 (2018)

    Google Scholar 

  14. Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: CCS (2017)

    Google Scholar 

  15. Chotard, J., Dufour Sans, E., Gay, R., Phan, D.H., Pointcheval, D.: Decentralized multi-client functional encryption for inner product. In: ASIACRYPT (2018)

    Google Scholar 

  16. Chotard, J., Dufour Sans, E., Gay, R., Phan, D.H., Pointcheval, D.: Multi-client functional encryption with repetition for inner product. Cryptology ePrint (2018)

    Google Scholar 

  17. Chotard, J., Dufour Sans, E., Gay, R., Phan, D.H., Pointcheval, D.: Dynamic decentralized functional encryption. In: CRYPTO (2020)

    Google Scholar 

  18. Escala, A., Herold, G., Kiltz, E., Rafols, C., Villar, J.L.: An algebraic framework for Diffie-Hellman assumptions. In: CRYPTO (2013)

    Google Scholar 

  19. Goldwasser, S., et al.: Multi-input functional encryption. In: Eurocrypt (2014)

    Google Scholar 

  20. Jager, T.: Verifiable random functions from weaker assumptions. In: TCC (2015)

    Google Scholar 

  21. Kitagawa, F., Nishimaki, R., Tanaka, K.: Obfustopia built on secret-key functional encryption. In: EUROCRYPT (2018)

    Google Scholar 

  22. Libert. B., Titiu, R.: Multi-client functional encryption for linear functions in the standard model from LWE. In: ASIACRYPT (2019)

    Google Scholar 

  23. Lin, H.: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs. In: CRYPTO (2017)

    Google Scholar 

  24. McMahan, B., Ramage, D.: Federated learning: collaborative machine learning without centralized training data (2017)

    Google Scholar 

  25. Nguyen, K., Phan, D.H., Pointcheval, D.: Multi-client functional encryption with fine-grained access control. In: ASIACRYPT (2023)

    Google Scholar 

  26. Shi, E., Chan, T.-H.H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: NDSS (2011)

    Google Scholar 

  27. Shi, E., Wu, K.: Non-interactive anonymous router. In: Eurocrypt (2021)

    Google Scholar 

  28. Tomida, J.: Tightly secure inner product functional encryption: multi-input and function-hiding constructions. Theoret. Comput. Sci. 833, 56–86 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  29. Ünal, A.: Impossibility results for lattice-based functional encryption schemes. In: Eurocrypt, pp. 169–199 (2020)

    Google Scholar 

  30. Waters, B.: Efficient identity-based encryption without random oracles. In: Eurocrypt (2005)

    Google Scholar 

  31. Wee, H.: New techniques for attribute-hiding in prime-order bilinear groups. Manuscript (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nikhil Vanjani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shi, E., Vanjani, N. (2023). Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. In: Boldyreva, A., Kolesnikov, V. (eds) Public-Key Cryptography – PKC 2023. PKC 2023. Lecture Notes in Computer Science, vol 13940. Springer, Cham. https://doi.org/10.1007/978-3-031-31368-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-31368-4_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-31367-7

  • Online ISBN: 978-3-031-31368-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics