{"title":"用于集合交集的灵活多客户端功能加密。","authors":"Mojtaba Rafiee","doi":"10.1007/s11227-023-05129-y","DOIUrl":null,"url":null,"abstract":"<p><p>A multi-client functional encryption (<math><mi>MCFE</mi></math>) scheme [Goldwasser-Gordon-Goyal 2014] for set intersection is a cryptographic primitive that enables an evaluator to learn the intersection from all sets of a predetermined number of clients, without need to learn the plaintext set of each individual client. Using these schemes, it is impossible to compute the set intersections from arbitrary subsets of clients, and thus, this constraint limits the range of its applications. To provide such a possibility, we redefine the syntax and security notions of <math><mi>MCFE</mi></math> schemes, and introduce flexible multi-client functional encryption (<math><mi>FMCFE</mi></math>) schemes. We extend the <math><mi>aIND</mi></math> security of <math><mi>MCFE</mi></math> schemes to <math><mi>aIND</mi></math> security of <math><mi>FMCFE</mi></math> schemes in a straightforward way. For a universal set with polynomial size in security parameter, we propose an <math><mi>FMCFE</mi></math> construction for achieving <math><mi>aIND</mi></math> security. Our construction computes set intersection for <i>n</i> clients that each holds a set with <i>m</i> elements, in time <math><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>m</mi><mo>)</mo></mrow></math>. We also prove the security of our construction under DDH1 that it is a variant of the symmetric external Diffie-Hellman (SXDH) assumption.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-22"},"PeriodicalIF":2.5000,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10049912/pdf/","citationCount":"1","resultStr":"{\"title\":\"Flexible multi-client functional encryption for set intersection.\",\"authors\":\"Mojtaba Rafiee\",\"doi\":\"10.1007/s11227-023-05129-y\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>A multi-client functional encryption (<math><mi>MCFE</mi></math>) scheme [Goldwasser-Gordon-Goyal 2014] for set intersection is a cryptographic primitive that enables an evaluator to learn the intersection from all sets of a predetermined number of clients, without need to learn the plaintext set of each individual client. Using these schemes, it is impossible to compute the set intersections from arbitrary subsets of clients, and thus, this constraint limits the range of its applications. To provide such a possibility, we redefine the syntax and security notions of <math><mi>MCFE</mi></math> schemes, and introduce flexible multi-client functional encryption (<math><mi>FMCFE</mi></math>) schemes. We extend the <math><mi>aIND</mi></math> security of <math><mi>MCFE</mi></math> schemes to <math><mi>aIND</mi></math> security of <math><mi>FMCFE</mi></math> schemes in a straightforward way. For a universal set with polynomial size in security parameter, we propose an <math><mi>FMCFE</mi></math> construction for achieving <math><mi>aIND</mi></math> security. Our construction computes set intersection for <i>n</i> clients that each holds a set with <i>m</i> elements, in time <math><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>m</mi><mo>)</mo></mrow></math>. We also prove the security of our construction under DDH1 that it is a variant of the symmetric external Diffie-Hellman (SXDH) assumption.</p>\",\"PeriodicalId\":50034,\"journal\":{\"name\":\"Journal of Supercomputing\",\"volume\":\" \",\"pages\":\"1-22\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2023-03-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10049912/pdf/\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Supercomputing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11227-023-05129-y\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Supercomputing","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11227-023-05129-y","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Flexible multi-client functional encryption for set intersection.
A multi-client functional encryption () scheme [Goldwasser-Gordon-Goyal 2014] for set intersection is a cryptographic primitive that enables an evaluator to learn the intersection from all sets of a predetermined number of clients, without need to learn the plaintext set of each individual client. Using these schemes, it is impossible to compute the set intersections from arbitrary subsets of clients, and thus, this constraint limits the range of its applications. To provide such a possibility, we redefine the syntax and security notions of schemes, and introduce flexible multi-client functional encryption () schemes. We extend the security of schemes to security of schemes in a straightforward way. For a universal set with polynomial size in security parameter, we propose an construction for achieving security. Our construction computes set intersection for n clients that each holds a set with m elements, in time . We also prove the security of our construction under DDH1 that it is a variant of the symmetric external Diffie-Hellman (SXDH) assumption.
期刊介绍:
The Journal of Supercomputing publishes papers on the technology, architecture and systems, algorithms, languages and programs, performance measures and methods, and applications of all aspects of Supercomputing. Tutorial and survey papers are intended for workers and students in the fields associated with and employing advanced computer systems. The journal also publishes letters to the editor, especially in areas relating to policy, succinct statements of paradoxes, intuitively puzzling results, partial results and real needs.
Published theoretical and practical papers are advanced, in-depth treatments describing new developments and new ideas. Each includes an introduction summarizing prior, directly pertinent work that is useful for the reader to understand, in order to appreciate the advances being described.