Abstract | ||
---|---|---|
Most functional encryption schemes implicitly assume that inputs to decryption algorithms, i.e., secret keys and ciphertexts, are generated honestly. However, they may be tampered by malicious adversaries. Thus, verifiable functional encryption (VFE) was proposed by Badrinarayanan et al. in ASIACRYPT 2016 where anyone can publicly check the validity of secret keys and ciphertexts. They employed indistinguishability-based (IND-based) security due to an impossibility result of simulation-based (SIM-based) VFE even though SIM-based security is more desirable. In this paper, we propose a SIM-based VFE scheme. To bypass the impossibility result, we introduce a trusted setup assumption. Although it appears to be a strong assumption, we demonstrate that it is reasonable in a hardware-based construction, e.g., Fisch et al. in ACM CCS 2017. Our construction is based on a verifiable public-key encryption scheme (Nieto et al. in SCN 2012), a signature scheme, and a secure hardware scheme, which we refer to as VFE-HW. Finally, we discuss an implementation of VFE-HW using Intel Software Guard Extensions (Intel SGX). |
Year | DOI | Venue |
---|---|---|
2021 | 10.1007/978-3-030-90402-9_12 | PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021 |
Keywords | DocType | Volume |
Functional encryption, Intel SGX, Verifiability, Simulation security | Conference | 13059 |
ISSN | Citations | PageRank |
0302-9743 | 0 | 0.34 |
References | Authors | |
0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tatsuya Suzuki | 1 | 1 | 1.71 |
Keita Emura | 2 | 316 | 36.97 |
Toshihiro Ohigashi | 3 | 73 | 12.10 |
Kazumasa Omote | 4 | 320 | 32.02 |