Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption

08/23/2019
by   Vipin Singh Sehrawat, et al.
0

We define a pseudorandom function (PRF) F: K×X→Y to be bi-homomorphic when it is fully Key homomorphic and partially Input Homomorphic (KIH), i.e., given F(k_1, x_1) and F(k_2, x_2), there is an efficient algorithm to compute F(k_1 ⊕ k_2, x_1 x_2), where ⊕ and are (binary) group operations. The homomorphism on the input is restricted to a fixed subset of the input bits, i.e., operates on some pre-decided m-out-of-n bits, where |x_1| = |x_2| = n, m < n, and the remaining n-m bits are identical in both inputs. In addition, the output length, ℓ, of the operator is not fixed and is defined as n ≤ℓ≤ 2n, hence leading to Homomorphically induced Variable input Length (HVL) as n ≤ |x_1 x_2| ≤ 2n. We present a learning with errors (LWE) based construction for a HVL-KIH-PRF family. Our construction is inspired by the key homomorphic PRF construction due to Banerjee and Peikert (Crypto 2014). We use our novel PRF family to construct an updatable encryption scheme, named QPC-UE-UU, which is quantum-safe, post-compromise secure and supports unidirectional ciphertext updates, i.e., the tokens can be used to perform ciphertext updates, but they cannot be used to undo completed updates. Our PRF family also leads to the first left/right key homomorphic constrained-PRF family with HVL.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/22/2023

Public Key Encryption with Secure Key Leasing

We introduce the notion of public key encryption with secure key leasing...
research
12/30/2021

Deniable Encryption in a Quantum World

(Sender-)Deniable encryption provides a very strong privacy guarantee: a...
research
07/13/2020

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

Puncturable encryption (PE), proposed by Green and Miers at IEEE S P 2...
research
06/02/2022

First demonstration of a post-quantum key-exchange with a nanosatellite

We demonstrate a post-quantum key-exchange with the nanosatellite SpooQy...
research
11/02/2020

Computing Power, Key Length and Cryptanalysis. An Unending Battle?

There are several methods to measure computing power. On the other hand,...
research
05/14/2020

Lattice-based Unidirectional IBPRE Secure in Standard Model

Proxy re-encryption (PRE) securely enables the re-encryption of cipherte...
research
03/14/2019

Keyed hash function from large girth expander graphs

In this paper we present an algorithm to compute keyed hash function (me...

Please sign up or login with your details

Forgot password? Click here to reset