TY - JOUR
T1 - Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
AU - Boneh, Dan
AU - Zhandry, Mark
N1 - Funding Information:
We thank Jonathan Ullman for his comments on the connection to differential privacy. We thank Brent Waters for suggesting adding capabilities to existing systems such as RSA, and for comments on the definitions of security for key exchange protocols. This work was supported by NSF, the DARPA PROCEED program, an AFO SR MURI award, a grant from ONR, an IARPA project provided via DoI/NBC, and by a Google faculty scholarship. Opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of DARPA or IARPA.
Publisher Copyright:
© 2016, Springer Science+Business Media New York.
PY - 2017/12/1
Y1 - 2017/12/1
N2 - In this work, we show how to use indistinguishability obfuscation to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy several interesting properties that have not been achievable before:Our multiparty non-interactive key exchange protocol does not require a trusted setup. Moreover, the size of the published value from each user is independent of the total number of users.Our broadcast encryption schemes support distributed setup, where users choose their own secret keys rather than be given secret keys by a trusted entity. The broadcast ciphertext size is independent of the number of users.Our traitor tracing system is fully collusion resistant with short ciphertexts, secret keys, and public key. Ciphertext size is logarithmic in the number of users and secret key size is independent of the number of users. Our public key size is polylogarithmic in the number of users. The recent functional encryption system of Garg, Gentry, Halevi, Raykova, Sahai, and Waters also leads to a traitor tracing scheme with similar ciphertext and secret key size, but the construction in this paper is simpler and more direct. These constructions resolve an open problem relating to differential privacy.Generalizing our traitor tracing system gives a private broadcast encryption scheme (where broadcast ciphertexts reveal minimal information about the recipient set) with optimal size ciphertext. Several of our proofs of security introduce new tools for proving security using indistinguishability obfuscation.
AB - In this work, we show how to use indistinguishability obfuscation to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy several interesting properties that have not been achievable before:Our multiparty non-interactive key exchange protocol does not require a trusted setup. Moreover, the size of the published value from each user is independent of the total number of users.Our broadcast encryption schemes support distributed setup, where users choose their own secret keys rather than be given secret keys by a trusted entity. The broadcast ciphertext size is independent of the number of users.Our traitor tracing system is fully collusion resistant with short ciphertexts, secret keys, and public key. Ciphertext size is logarithmic in the number of users and secret key size is independent of the number of users. Our public key size is polylogarithmic in the number of users. The recent functional encryption system of Garg, Gentry, Halevi, Raykova, Sahai, and Waters also leads to a traitor tracing scheme with similar ciphertext and secret key size, but the construction in this paper is simpler and more direct. These constructions resolve an open problem relating to differential privacy.Generalizing our traitor tracing system gives a private broadcast encryption scheme (where broadcast ciphertexts reveal minimal information about the recipient set) with optimal size ciphertext. Several of our proofs of security introduce new tools for proving security using indistinguishability obfuscation.
KW - Broadcast encryption
KW - Key exchange
KW - Obfuscation
KW - Traitor tracing
UR - http://www.scopus.com/inward/record.url?scp=84995387548&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84995387548&partnerID=8YFLogxK
U2 - 10.1007/s00453-016-0242-8
DO - 10.1007/s00453-016-0242-8
M3 - Article
AN - SCOPUS:84995387548
SN - 0178-4617
VL - 79
SP - 1233
EP - 1285
JO - Algorithmica
JF - Algorithmica
IS - 4
ER -