Skip to main content
Top
Published in: Designs, Codes and Cryptography 8/2021

28-05-2021

Simple and efficient FE for quadratic functions

Authors: Junqing Gong, Haifeng Qian

Published in: Designs, Codes and Cryptography | Issue 8/2021

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents two functional encryption schemes for quadratic functions (or degree-2 polynomials) achieving simulation-based security in the semi-adaptive model with constant-size secret keys. Prior constructions in the standard model either achieve weaker security model [CRYPTO 17] or require linear-size secret keys (in the message length) [PKC 20]. One of our proposed schemes is comparable to existing schemes in the generic group model in terms of ciphertext size. Technically, we combine Wee’s compiler [TCC 17] with Gay’s paradigm [PKC 20]. However, we avoid (partially) function-hiding inner-product functional encryption used in Gay’s paradigm which makes our work conceptually simpler.
Appendix
Available only for authorised users
Footnotes
1
An IPFE scheme trivially implies a QFFE without the efficiency requirement, which is not interesting in many cases.
 
2
For matrices \(\mathbf {A},\mathbf {B}\) of the same size, it holds that \(\mathsf {tr}(\mathbf {A}^{}{\top }\mathbf {B}) = \mathsf {tr}(\mathbf {B}\mathbf {A}^{}{\top })\).
 
Literature
2.
go back to reference Abdalla M., Catalano D., Fiore D., Gay R., Ursu B.: Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings. In: Shacham H., Boldyreva A. (eds.) CRYPTO 2018, Part I, LNCS, vol. 10991, pp. 597–627. Springer, Heidelberg (2018). https://doi.org/10.1007/978-3-319-96884-1_20. Abdalla M., Catalano D., Fiore D., Gay R., Ursu B.: Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings. In: Shacham H., Boldyreva A. (eds.) CRYPTO 2018, Part I, LNCS, vol. 10991, pp. 597–627. Springer, Heidelberg (2018). https://​doi.​org/​10.​1007/​978-3-319-96884-1_​20.
4.
go back to reference Abdalla M., Gong J., Wee H.: Functional encryption for attribute-weighted sums from k-lin. In: Advances in Cryptology—CRYPTO 2020—40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I, pp. 685–716 (2020). Abdalla M., Gong J., Wee H.: Functional encryption for attribute-weighted sums from k-lin. In: Advances in Cryptology—CRYPTO 2020—40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I, pp. 685–716 (2020).
7.
go back to reference Agrawal S., Libert B., Maitra M., Titiu R.: Adaptive simulation security for inner product functional encryption. In: Kiayias A, Kohlweiss M, Wallden P., Zikas V. (eds.) PKC 2020, Part I, LNCS, vol. 12110, pp. 34–64. Springer, Heidelberg (2020). https://doi.org/10.1007/978-3-030-45374-9_2. Agrawal S., Libert B., Maitra M., Titiu R.: Adaptive simulation security for inner product functional encryption. In: Kiayias A, Kohlweiss M, Wallden P., Zikas V. (eds.) PKC 2020, Part I, LNCS, vol. 12110, pp. 34–64. Springer, Heidelberg (2020). https://​doi.​org/​10.​1007/​978-3-030-45374-9_​2.
10.
go back to reference Ananth P., Sahai A.: Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps. In: Coron J., Nielsen J.B. (eds.) EUROCRYPT 2017, Part I, LNCS, vol. 10210, pp. 152–181. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-56620-7_6. Ananth P., Sahai A.: Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps. In: Coron J., Nielsen J.B. (eds.) EUROCRYPT 2017, Part I, LNCS, vol. 10210, pp. 152–181. Springer, Heidelberg (2017). https://​doi.​org/​10.​1007/​978-3-319-56620-7_​6.
11.
go back to reference Attrapadung N.: Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more. In: Nguyen P.Q., Oswald E. (eds.) EUROCRYPT 2014, LNCS, vol. 8441, pp. 557–577. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55220-5_31. Attrapadung N.: Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more. In: Nguyen P.Q., Oswald E. (eds.) EUROCRYPT 2014, LNCS, vol. 8441, pp. 557–577. Springer, Heidelberg (2014). https://​doi.​org/​10.​1007/​978-3-642-55220-5_​31.
12.
go back to reference Baltico C.E.Z., Catalano D., Fiore D., Gay R.: Practical functional encryption for quadratic functions with applications to predicate encryption. In: Katz J., Shacham H. (eds.) CRYPTO 2017, Part I, LNCS, vol. 10401, pp. 67–98. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-63688-7_3. Baltico C.E.Z., Catalano D., Fiore D., Gay R.: Practical functional encryption for quadratic functions with applications to predicate encryption. In: Katz J., Shacham H. (eds.) CRYPTO 2017, Part I, LNCS, vol. 10401, pp. 67–98. Springer, Heidelberg (2017). https://​doi.​org/​10.​1007/​978-3-319-63688-7_​3.
17.
go back to reference Chotard J., Dufour Sans E., Gay R., Phan D.H., Pointcheval D.: Decentralized multi-client functional encryption for inner product. In: Peyrin T., Galbraith S. (eds.) ASIACRYPT 2018, Part II, LNCS, vol. 11273, pp. 703–732. Springer, Heidelberg (2018). https://doi.org/10.1007/978-3-030-03329-3_24. Chotard J., Dufour Sans E., Gay R., Phan D.H., Pointcheval D.: Decentralized multi-client functional encryption for inner product. In: Peyrin T., Galbraith S. (eds.) ASIACRYPT 2018, Part II, LNCS, vol. 11273, pp. 703–732. Springer, Heidelberg (2018). https://​doi.​org/​10.​1007/​978-3-030-03329-3_​24.
18.
go back to reference Dufour Sans E., Gay R., Pointcheval D.: Reading in the dark: Classifying encrypted digits with functional encryption. IACR Cryptology ePrint Archive 2018/206 (2018) Dufour Sans E., Gay R., Pointcheval D.: Reading in the dark: Classifying encrypted digits with functional encryption. IACR Cryptology ePrint Archive 2018/206 (2018)
24.
go back to reference Gay R., Jain A., Lin H., Sahai A.: Indistinguishability obfuscation from simple-to-state hard problems: New assumptions, new techniques, and simplification. IACR Cryptology ePrint Archive 2020/764 (2020). Gay R., Jain A., Lin H., Sahai A.: Indistinguishability obfuscation from simple-to-state hard problems: New assumptions, new techniques, and simplification. IACR Cryptology ePrint Archive 2020/764 (2020).
25.
go back to reference Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A., Wright R.N., De Capitani di Vimercati S. (eds.) ACM CCS 2006, pp. 89–98. ACM Press (2006). https://doi.org/10.1145/1180405.1180418. Available as Cryptology ePrint Archive Report 2006/309. Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A., Wright R.N., De Capitani di Vimercati S. (eds.) ACM CCS 2006, pp. 89–98. ACM Press (2006). https://​doi.​org/​10.​1145/​1180405.​1180418. Available as Cryptology ePrint Archive Report 2006/309.
26.
go back to reference Jain A., Lin H., Sahai A.: Simplifying constructions and assumptions for io. IACR Cryptology ePrint Archive 2019/1252 (2019). Jain A., Lin H., Sahai A.: Simplifying constructions and assumptions for io. IACR Cryptology ePrint Archive 2019/1252 (2019).
29.
go back to reference O’Neill A.: Definitional issues in functional encryption. IACR Cryptology ePrint Archive 2010/556 (2010). O’Neill A.: Definitional issues in functional encryption. IACR Cryptology ePrint Archive 2010/556 (2010).
30.
go back to reference Ryffel T., Pointcheval D., Bach F., Dufour-Sans E., Gay R.: Partially encrypted deep learning using functional encryption. Partially encrypted deep learning using functional encryption. In: Wallach H.M., Larochelle H., Beygelzimer A., d’Alché-Buc F., Fox E.B., Garnett R. (eds.) Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, 8-14 December 2019, Vancouver, BC, Canada, pp. 4519–4530 (2019). Ryffel T., Pointcheval D., Bach F., Dufour-Sans E., Gay R.: Partially encrypted deep learning using functional encryption. Partially encrypted deep learning using functional encryption. In: Wallach H.M., Larochelle H., Beygelzimer A., d’Alché-Buc F., Fox E.B., Garnett R. (eds.) Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, 8-14 December 2019, Vancouver, BC, Canada, pp. 4519–4530 (2019).
Metadata
Title
Simple and efficient FE for quadratic functions
Authors
Junqing Gong
Haifeng Qian
Publication date
28-05-2021
Publisher
Springer US
Published in
Designs, Codes and Cryptography / Issue 8/2021
Print ISSN: 0925-1022
Electronic ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-021-00871-x

Other articles of this Issue 8/2021

Designs, Codes and Cryptography 8/2021 Go to the issue

Premium Partner