New Concept in Functional Encryption Introduced by Researchers
/ 3 min read
Quick take - Researchers from the University of Massachusetts Amherst and ETH Zurich have introduced a new concept in functional encryption called access-controlled inner-product function-revealing encryption (AC-IPFRE), which emphasizes function evaluation based on specified access policies and demonstrates significant theoretical and practical applications, including an outsourced approximate nearest-neighbor search protocol.
Fast Facts
- Researchers from the University of Massachusetts Amherst and ETH Zurich introduced “Access-Controlled Inner Product Function-Revealing Encryption” (AC-IPFRE), extending access control in functional encryption.
- AC-IPFRE allows function evaluation only when a specified access policy is satisfied, with significant applications highlighted in practical contexts.
- The study demonstrates the equivalence between function-hiding inner-product functional encryption (FH-IPFE) and inner-product function-revealing encryption (IPFRE), constructing AC-IPFRE from IPFRE for the non-zero inner-product (NZIP) access policy.
- The authors propose an outsourced approximate nearest-neighbor (ANN) search protocol using AC-IPFRE to reduce information leakage and provide a practical scheme within the generic bilinear group model.
- The research advances the field by achieving attribute-hiding small-universe AC-IPFRE for arbitrary access policies, marking a significant milestone in access control for functional encryption.
New Concept in Functional Encryption Introduced by Researchers
Researchers from the University of Massachusetts Amherst and ETH Zurich have introduced a new concept in the field of functional encryption. The paper, titled “Access-Controlled Inner Product Function-Revealing Encryption,” is authored by Weiqi Feng, Adam O’Neill, and Roman Langrehr.
Access-Controlled Inner-Product Function-Revealing Encryption
The study extends the idea of access control within functional encryption, emphasizing that function evaluation is possible only when a specified access policy is satisfied. The primary focus of the research is the introduction of access-controlled inner-product function-revealing encryption (AC-IPFRE). The authors highlight two significant applications of AC-IPFRE, showcasing its potential in various practical contexts.
A notable theoretical contribution of the work is the demonstration of the equivalence between function-hiding inner-product functional encryption (FH-IPFE) and inner-product function-revealing encryption (IPFRE). The authors construct AC-IPFRE from IPFRE, specifically tailored for the non-zero inner-product (NZIP) access policy.
Practical Applications and Protocols
The construction of AC-IPFRE utilizes an effective version of Lagrange’s Four Square Theorem. The paper underscores the necessity of bilinear pairings in the development of IPFRE, a conclusion supported by lower bounds established by researcher Ünal.
On the practical side, the authors propose an outsourced approximate nearest-neighbor (ANN) search protocol that uses AC-IPFRE to mitigate potential information leakage. Additionally, they have devised a practical AC-IPFRE scheme within the framework of the generic bilinear group model, specifically targeting an access policy related to ANN search.
The authors apply techniques from Wee (TCC 2020), recognized as the most efficient FH-IPFE scheme currently available. They provide insights into the performance of the implemented outsourced ANN search protocol.
Significance of the Research
The research further demonstrates that AC-IPFRE for the NZIP access policy implies attribute-hiding small-universe AC-IPFRE for arbitrary access policies. This marks a significant advancement since previous research on access control for functional encryption had not achieved attribute hiding.
Overall, the findings of this paper underscore both the theoretical and practical significance of AC-IPFRE, laying the groundwork for future studies in the evolving field of access-controlled encryption.
Original Source: Read the Full Article Here