Header menu link for other important links
X
Efficient public trace and revoke from standard assumptions
Published in Association for Computing Machinery
2017
Pages: 2277 - 2293
Abstract
We provide efficient constructions for trace-and-revoke systems with public traceability in the black-box confirmation model. Our constructions achieve adaptive security, are based on standard assumptions and achieve significant efficiency gains compared to previous constructions. Our constructions rely on a generic transformation from inner product functional encryption (IPFE) schemes to traceand-revoke systems. Our transformation requires the underlying IPFE scheme to only satisfy a very weak notion of security-the attacker may only request a bounded number of random keys-in contrast to the standard notion of security where she may request an unbounded number of arbitrarily chosen keys. We exploit the much weaker security model to provide a new construction for bounded collusion and random key IPFE from the learning with errors assumption (LWE), which enjoys improved efficiency compared to the scheme of Agrawal et al. [CRYPTO'16]. Together with IPFE schemes from Agrawal et al., we obtain trace and revoke from LWE, Decision Diffie Hellman and Decision Composite Residuosity. © 2017 author(s).
About the journal
JournalData powered by TypesetProceedings of the ACM Conference on Computer and Communications Security
PublisherData powered by TypesetAssociation for Computing Machinery
ISSN15437221
Open AccessNo
Concepts (12)
  •  related image
    Efficiency
  •  related image
    Network security
  •  related image
    Random errors
  •  related image
    DECISION DIFFIE-HELLMAN
  •  related image
    Efficient construction
  •  related image
    FUNCTIONAL ENCRYPTIONS
  •  related image
    GENERIC TRANSFORMATIONS
  •  related image
    Learning with errors
  •  related image
    PUBLIC TRACEABILITY
  •  related image
    Standard assumptions
  •  related image
    TRACE-AND-REVOKE
  •  related image
    Cryptography