open access publication

Article, 2024

Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors

Journal of Cryptology, ISSN 0933-2790, Volume 37, 3, 10.1007/s00145-024-09504-7

Contributors

Francati D. 0000-0002-4639-0636 (Corresponding author) [1] Friolo D. 0000-0003-0836-1735 [2] Malavolta G. [3] Venturi D. 0000-0003-2379-8564 [2]

Affiliations

  1. [1] Aarhus University
  2. [NORA names: AU Aarhus University; University; Denmark; Europe, EU; Nordic; OECD];
  3. [2] Dipartimento di Fisica
  4. [NORA names: Italy; Europe, EU; OECD];
  5. [3] Bocconi University
  6. [NORA names: Italy; Europe, EU; OECD]

Abstract

We put forward two natural generalizations of predicate encryption (PE), dubbed multi-key and multi-input PE. More in details, our contributions are threefold. Definitions. We formalize security of multi-key PE and multi-input PE following the standard indistinguishability paradigm, and modeling security both against malicious senders (i.e., corruption of encryption keys) and malicious receivers (i.e., collusions). Constructions. We construct adaptively secure multi-key and multi-input PE supporting the conjunction of poly-many arbitrary single-input predicates, assuming the sub-exponential hardness of the learning with errors (LWE) problem. Applications. We show that multi-key and multi-input PE for expressive enough predicates suffices for interesting cryptographic applications, including non-interactive multi-party computation (NI-MPC) and matchmaking encryption (ME). In particular, plugging in our constructions of multi-key and multi-input PE, under the sub-exponential LWE assumption, we obtain the first ME supporting arbitrary policies with unbounded collusions, as well as robust (resp. non-robust) NI-MPC for so-called all-or-nothing functions satisfying a non-trivial notion of reusability and supporting a constant (resp. polynomial) number of parties. Prior to our work, both of these applications required much heavier tools such as indistinguishability obfuscation or compact functional encryption.

Keywords

LWE, Matchmaking encryption, Non-interactive MPC, Predicate encryption

Funders

  • European Commission
  • Bundesministerium für Bildung und Forschung
  • Deutsche Forschungsgemeinschaft
  • European Research Council
  • Carlsbergfondet

Data Provider: Elsevier