Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Functional Encryption (FE) has been extensively studied in the recent years, mainly focusing on the feasibility of constructing FE for general functionalities, as well as some realizations for restricted functionalities of practical interest, such as inner-product. However, little consideration has been given to the issue of key leakage on FE. The property of FE that allows multiple users to obtain the same functional keys from the holder of the master secret key raises an important problem: if some users leak their keys or collude to create a pirate decoder, how can we identify at least one of those users, given some information about the compromised keys or the pirate decoder? Moreover, how do we disable the decryption capabilities of those users (i.e. traitors)? Two recent works have offered potential solutions to the above traitor scenario. However, the two solutions satisfy weaker notions of security and traceability, can only tolerate bounded collusions (i.e., there is an a priori bound on the number of keys the pirate decoder obtains), or can only handle a polynomially large universe of possible identities. In this paper, we study trace-and -revoke mechanism on FE and provide the first construction of trace-and-revoke FE that supports arbitrary identities, is both fully collusion resistant and fully anonymous. Our construction relies on a generic transformation from revocable predicate functional encryption with broadcast (RPFE with broadcast, which is an extension of revocable predicate encryption with broadcast proposed by Kim and J. Wu at ASIACRYPT'2020) to trace-and-revoke FE. Since this construction admits a generic construction of trace-and-revoke inner-product FE (IPFE), we instantiate the trace-and -revoke IPFE from the well-studied Learning with Errors (LWE). This is achieved by proposing a new LWE-based attribute-based IPFE (ABIPFE) scheme to instantiate RPFE with broadcast.
Original languageEnglish
Article number114368
Number of pages27
JournalTheoretical Computer Science
Volume987
Early online dateDec 2023
DOIs
Publication statusPublished - 1 Mar 2024

Keywords

  • Functional encryption
  • Inner-product functional encryption
  • Trace-and-revoke system
  • Traceability

Fingerprint

Dive into the research topics of 'Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities'. Together they form a unique fingerprint.

Cite this