functional encryption for
play

Functional Encryption for Regular Languages Brent Waters Public Key - PowerPoint PPT Presentation

Functional Encryption for Regular Languages Brent Waters Public Key Encryption [DH76,M78,RSA78,GM84] Avoid Prior Secret Exchange PubK SK 2 Functional Encryption [SW05] Functionality: f( , ) MSK Authority Key: y 2 {0,1}* y SK CT: x


  1. Functional Encryption for Regular Languages Brent Waters

  2. Public Key Encryption [DH76,M78,RSA78,GM84] Avoid Prior Secret Exchange PubK SK 2

  3. Functional Encryption [SW05…] Functionality: f( ¢ , ¢ ) MSK Authority Key: y 2 {0,1}* y SK CT: x 2 {0,1} * Security: “Can only learn f(x,y)” Public Params x f(x,y) 3

  4. “Key Policy” ABE [GPSW06] Key: Boolean Formula (or circuit) CT: Variables “ Public Index ” Functionality: Evaluate formula, if true give message 4

  5. Limitations Key is a single formula/circuit OR x 1 AND x 2 x 3 Operates over fixed sized input Form Image Fixed Size: Text Video Arbitrary Length: Goal: Functional Enc. for arbitrary length inputs 5

  6. Regular Languages Language is regular iff strings accepted some Deterministic Finite Automata (DFA) Applications Search <[^>]*> Firewall Rules (?i)^([^./]+\.)*(grooveshark\.com|gs-cdn\.net)(?![^/])

  7. Determinstic Finite Automata (DFA) Set of states Start state Alphabet Accept states Transition Note: Some Regular Expressions not efficiently expressible as DFAs.

  8. A Simple Example Language = “Begins with 1 and has even parity”  1 Accept(M,w) Start 1 1 A B C 0 0 w = 1 0 1 0

  9. DFA-Based F.E. System Key: DFA CT: Arbitrary length string “ Public Index ” Functionality: Evaluate DFA M on w, if accepts give message 9

  10. System Overview Setting: Bilinear group G of order p Key: CT: Decrypt: At state x after j symbols Three Mechanisms Initialization: Compute Transition: Completion: Recover message using 10

  11. Setup Input: 1) Choose Bilinear group G of order p 2) Public Parameters: Master Secret: 11

  12. Encryption Input: “Linking” Note: Only showing components for transition mechanism!

  13. Key Generation Input: Define Note: Only showing components for transition mechanism!

  14. Transition Mechanism (of decryption) Suppose Compute: Transition:

  15. Summary & Three Problems Functional Enc. for arbitrary length inputs: Achieved DFAs Problems (1) Support Non-deterministic Finite Automata (NFA) (2) Climb the Chomsky Hierarchy (3) Move past public index model 15

  16. Thank you 16

Recommend


More recommend