TY - GEN
T1 - Multi-client Functional Encryption with Public Inputs and Strong Security
AU - Nguyen, Ky
AU - Phan, Duong Hieu
AU - Pointcheval, David
N1 - Publisher Copyright:
© International Association for Cryptologic Research 2025.
PY - 2025/1/1
Y1 - 2025/1/1
N2 - Recent years have witnessed a significant development for functional encryption (FE) in the multi-user setting, particularly with multi-client functional encryption (MCFE). The challenge becomes more important when combined with access control, such as attribute-based encryption (ABE), which was actually not covered syntactically by the public-key FE nor semantically by the secret-key MCFE frameworks. On the other hand, as for complex primitives, many works have studied the admissibility of adversaries to ensure that the security model encom-passes all real threats of attacks. 1. At a conceptual level, by adding a public input to FE/MCFE,we cover many previous primitives, notably attribute-based function classes. Furthermore, with the strongest admissibility for inner-product functionality, our framework is quite versatile, as it encrypts multiple sub-vectors, allows repetitions and corruptions, and even-tually also encompasses public-key FE and classical ABE,bridging the private setting of MCFE with the public setting of FE and ABE. 2. Finally, we propose an MCFE with public inputs with the class of functions that combines inner-products (on private inputs) and attribute-based access-control (on public inputs) for LSSS policies. We achieve the first AB-MCFE for inner products with strong admis-sibility (from Nguyen et al., ACNS’23) and with adaptive security. In the end, our concrete MCFE leads to MIFE for inner products, public-key single-input inner-product FE with LSSS key-policy, and KP-ABE for LSSS, with adaptive security. Previous AB-MCFE con-structions are either restricted in terms of weaker admissibility (Nguyen et al., ASIACRYPT’22) or considers a slightly larger functionality of attribute-weighted sum but with only selective security (Agrawal et al., CRYPTO’23).
AB - Recent years have witnessed a significant development for functional encryption (FE) in the multi-user setting, particularly with multi-client functional encryption (MCFE). The challenge becomes more important when combined with access control, such as attribute-based encryption (ABE), which was actually not covered syntactically by the public-key FE nor semantically by the secret-key MCFE frameworks. On the other hand, as for complex primitives, many works have studied the admissibility of adversaries to ensure that the security model encom-passes all real threats of attacks. 1. At a conceptual level, by adding a public input to FE/MCFE,we cover many previous primitives, notably attribute-based function classes. Furthermore, with the strongest admissibility for inner-product functionality, our framework is quite versatile, as it encrypts multiple sub-vectors, allows repetitions and corruptions, and even-tually also encompasses public-key FE and classical ABE,bridging the private setting of MCFE with the public setting of FE and ABE. 2. Finally, we propose an MCFE with public inputs with the class of functions that combines inner-products (on private inputs) and attribute-based access-control (on public inputs) for LSSS policies. We achieve the first AB-MCFE for inner products with strong admis-sibility (from Nguyen et al., ACNS’23) and with adaptive security. In the end, our concrete MCFE leads to MIFE for inner products, public-key single-input inner-product FE with LSSS key-policy, and KP-ABE for LSSS, with adaptive security. Previous AB-MCFE con-structions are either restricted in terms of weaker admissibility (Nguyen et al., ASIACRYPT’22) or considers a slightly larger functionality of attribute-weighted sum but with only selective security (Agrawal et al., CRYPTO’23).
UR - https://www.scopus.com/pages/publications/105005953582
U2 - 10.1007/978-3-031-91826-1_3
DO - 10.1007/978-3-031-91826-1_3
M3 - Conference contribution
AN - SCOPUS:105005953582
SN - 9783031918254
T3 - Lecture Notes in Computer Science
SP - 68
EP - 101
BT - Public-Key Cryptography – PKC 2025 - 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings
A2 - Jager, Tibor
A2 - Pan, Jiaxin
PB - Springer Science and Business Media Deutschland GmbH
T2 - 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025
Y2 - 12 May 2025 through 15 May 2025
ER -