4 research outputs found
Theory and Applications of Outsider Anonymity in Broadcast Encryption
Broadcast Encryption (BE) allows efficient one-to-many secret communication of data over a broadcast channel. In the standard setting of BE, information about receivers is transmitted in the clear together with ciphertexts. This could be a serious violation of recipient privacy since the identities of the users authorized to access the secret content in certain broadcast scenarios are as sensitive as the content itself. Anonymous Broadcast Encryption (AnoBe) prevents this leakage of recipient identities from ciphertexts but at a cost of a linear lower bound (in the number of receivers) on the length of ciphertexts. A linear ciphertext length is a highly undesirable bottleneck in any large-scale broadcast application. In this thesis, we propose a less stringent yet very meaningful notion of anonymity for anonymous broadcast encryption called Outsider-Anonymous Broadcast Encryption (oABE) that allows the creation of ciphertexts that are sublinear in the number of receivers. We construct several oABE schemes with varying security guarantees and levels of efficiency. We also present two very interesting cryptographic applications afforded by the efficiency of our oABE schemes. The first is Broadcast Steganography (BS), the extension of the state of the art setting of point-to-point steganography to the multi-recipient setting. The second is Oblivious Group Storage (OGS), the introduction of fine-grained data access control policies to the setting of multi-client oblivious cloud storage protocols
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
A long-standing open problem in cryptography is proving the existence of (deterministic) hard-core predicates for the Diffie-Hellman problem defined over finite fields. In this paper, we make progress on this problem by defining a very natural variation of the Diffie-Hellman problem over and proving the unpredictability of every single bit of one of the coordinates of the secret DH value.
To achieve our result, we modify an idea presented at CRYPTO\u2701 by Boneh and Shparlinski [4] originally developed to prove that the LSB of the elliptic curve Diffie-Hellman problem is hard. We extend this idea in two novel ways:
1. We generalize it to the case of finite fields ;
2. We prove that any bit, not just the LSB, is hard using the list decoding techniques of Akavia et al. [1] (FOCS\u2703) as generalized at CRYPTO\u2712 by Duc and Jetchev [6].
In the process, we prove several other interesting results:
- Our result also hold for a larger class of predicates, called \emph{segment predicates} in [1];
- We extend the result of Boneh and Shparlinski to prove that every bit (and every segment predicate) of the elliptic curve Diffie-Hellman problem is hard-core;
- We define the notion of \emph{partial one-way function} over finite fields and prove that every bit (and every segment predicate) of one of the input coordinates for these functions is hard-core
A General Purpose Transpiler for Fully Homomorphic Encryption
Fully homomorphic encryption (FHE) is an encryption scheme which enables
computation on encrypted data without revealing the underlying data. While
there have been many advances in the field of FHE, developing programs using
FHE still requires expertise in cryptography. In this white paper, we present a
fully homomorphic encryption transpiler that allows developers to convert
high-level code (e.g., C++) that works on unencrypted data into high-level code
that operates on encrypted data. Thus, our transpiler makes transformations
possible on encrypted data.
Our transpiler builds on Google's open-source XLS SDK
(https://github.com/google/xls) and uses an off-the-shelf FHE library, TFHE
(https://tfhe.github.io/tfhe/), to perform low-level FHE operations. The
transpiler design is modular, which means the underlying FHE library as well as
the high-level input and output languages can vary. This modularity will help
accelerate FHE research by providing an easy way to compare arbitrary programs
in different FHE schemes side-by-side. We hope this lays the groundwork for
eventual easy adoption of FHE by software developers. As a proof-of-concept, we
are releasing an experimental transpiler
(https://github.com/google/fully-homomorphic-encryption/tree/main/transpiler)
as open-source software