open access publication

Article, 2024

Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors

Journal of Cryptology, ISSN 1432-1378, 0933-2790, Volume 37, 3, Page 24, 10.1007/s00145-024-09504-7

Contributors

Francati, Danilo 0000-0002-4639-0636 (Corresponding author) [1] Friolo, Daniele 0000-0003-0836-1735 [2] Malavolta, Giulio 0009-0009-9737-0094 [3] Venturi, Daniele 0000-0003-2379-8564 [2]

Affiliations

  1. [1] Aarhus University
  2. [NORA names: AU Aarhus University; University; Denmark; Europe, EU; Nordic; OECD];
  3. [2] Sapienza University of Rome
  4. [NORA names: Italy; Europe, EU; OECD];
  5. [3] Bocconi University
  6. [NORA names: Italy; Europe, EU; OECD]

Abstract

We put forward two natural generalizations of predicate encryption (PE), dubbed multi-key and multi-input PE. More in details, our contributions are threefold.Definitions. We formalize security of multi-key PE and multi-input PE following the standard indistinguishability paradigm, and modeling security both against malicious senders (i.e., corruption of encryption keys) and malicious receivers (i.e., collusions).Constructions. We construct adaptively secure multi-key and multi-input PE supporting the conjunction of poly-many arbitrary single-input predicates, assuming the sub-exponential hardness of the learning with errors (LWE) problem.Applications. We show that multi-key and multi-input PE for expressive enough predicates suffices for interesting cryptographic applications, including non-interactive multi-party computation (NI-MPC) and matchmaking encryption (ME). In particular, plugging in our constructions of multi-key and multi-input PE, under the sub-exponential LWE assumption, we obtain the first ME supporting arbitrary policies with unbounded collusions, as well as robust (resp. non-robust) NI-MPC for so-called all-or-nothing functions satisfying a non-trivial notion of reusability and supporting a constant (resp. polynomial) number of parties. Prior to our work, both of these applications required much heavier tools such as indistinguishability obfuscation or compact functional encryption.

Keywords

LWE assumption, Multi-Key, applications, arbitrary policies, assumptions, collusion, computer, conjunction, constant, construction, contribution, cryptographic applications, details, encryption, error, functional encryption, hardness, indistinguishability obfuscation, learning, learning with errors, malicious receiver, malicious senders, matchmaking encryption, model security, multi-input, multi-party computation, natural generalization, obfuscation, paradigm, parties, policy, predicate encryption, predicates, problem, receiver, reusability, security, sender, sub-exponential hardness, tools, unbounded collusions

Funders

  • European Research Council
  • Deutsche Forschungsgemeinschaft
  • Carlsberg Foundation
  • Federal Ministry of Education and Research
  • European Commission

Data Provider: Digital Science