Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation

Dan Boneh, Mark Zhandry

Research output: Chapter in Book/Report/Conference proceedingConference contribution

114 Scopus citations

Abstract

In this work, we show how to use indistinguishability obfuscation (iO) to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy several interesting properties that have not been achievable before: - Our multiparty non-interactive key exchange protocol does not require a trusted setup. Moreover, the size of the published value from each user is independent of the total number of users. - Our broadcast encryption schemes support distributed setup, where users choose their own secret keys rather than be given secret keys by a trusted entity. The broadcast ciphertext size is independent of the number of users. - Our traitor tracing system is fully collusion resistant with short ciphertexts, secret keys, and public key. Ciphertext size is logarithmic in the number of users and secret key size is independent of the number of users. Our public key size is polylogarithmic in the number of users. The recent functional encryption system of Garg, Gentry, Halevi, Raykova, Sahai, and Waters also leads to a traitor tracing scheme with similar ciphertext and secret key size, but the construction in this paper is simpler and more direct. These constructions resolve an open problem relating to differential privacy. - Generalizing our traitor tracing system gives a private broadcast encryption scheme (where broadcast ciphertexts reveal minimal information about the recipient set) with optimal size ciphertext. Several of our proofs of security introduce new tools for proving security using indistinguishability obfuscation.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings
PublisherSpringer Verlag
Pages480-499
Number of pages20
EditionPART 1
ISBN (Print)9783662443705
DOIs
StatePublished - Jan 1 2014
Externally publishedYes
Event34rd Annual International Cryptology Conference, CRYPTO 2014 - Santa Barbara, CA, United States
Duration: Aug 17 2014Aug 21 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 1
Volume8616 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other34rd Annual International Cryptology Conference, CRYPTO 2014
CountryUnited States
CitySanta Barbara, CA
Period8/17/148/21/14

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation'. Together they form a unique fingerprint.

Cite this