Score:0

Functional Encryption in Private-key setting vs. Public-key setting

pt flag

$\bullet$ What does private-key functional encryption mean? Or functional encryption in private-key setting?
Wasn't functional encryption a generalization of public key encryption? So now, why do we have private-key functional encryption?! It's a little confusing.
I've seen a few sentences in Romain Gay's PhD thesis [Romain Gay's thesis 2019, pages 10-11].

A new construction of multi-input functional encryption for inner products.

... In this thesis, we strengthen the security of these constructions to handle corruption of the input slots. That is, to encrypt, each input slot $i\in[n]$ requires an encryption key $ek_{i}$. We consider the $\color{red}{\text{private-key}}$ setting, where encryption keys remain secret.

This is actually more relevant than the $\color{red}{\text{public-key}}$ setting, where the encryption keys $ek_{i}$ are revealed to everyone.

Indeed, in such a case, anyone can encrypt arbitrary message for any input slot. That weakens security drastically, since a challenge ciphertext $\mathsf{Enc}(ek_{i}, m_{b})$ for message $m^{b}_{i}$, where $b\leftarrow_{R}\{0,1\}$ is chosen by the security game, can be combined with encryption of arbitrary messages for the other input slots during decryption. That means that given even a single functional decryption key for a function $f$, one can learn $f(*,\ldots,*,m^{b}_{i},*,x,\ldots,*)$, where each $*$ can be any arbitrary message. This is simply too much information in most relevant use cases.

Thus, we consider the setting where encryption keys $ek_{i}$ aren’t public, which avoids precisely this kind of leakage of information. ...

$\bullet$ Based on the above quote, the terms "private-key setting" and "public-key setting" are just for multi-input functional encryption? Or these terms are more general and are for functional encryption?

In another paper [Carla Mascia, Massimiliano Sala, Irene Vilia."A Survey On Functional Encryption", 2021, In Advances in Mathematics of Communications, 2023, 17(5): 1251-1289. doi: 10.3934/amc.2021049, page 4] is written

Remark 2.5. For some practical applications, it is relevant to distinguish between public-key and private-key setting. In the former, anyone can encrypt using the public key generated in the $\mathsf{Setup}$ phase; in the latter, only those who own the master key can encrypt. Notice that the definition of FE scheme in Definition 2.2 is given in the public-key setting.

$\bullet$ Can someone illustrate by example some practical applications where it's relevant to distinguish between public-key and private-key setting of an functional encryption?
In a public-key FE scheme, we have a master secret key for central authority, a master public key, secret functional decryption keys for users. Now, in private-key FE, what do we have?

$\bullet$ Is private-key setting of functional encryption the same as function hiding property of a functional encryption? In following the abstract of [Emily Shen, Elaine Shi, Brent Waters. "Predicate Privacy in Encryption Systems", In TCC 2009]

Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generate secret key tokens corresponding to predicates. An encryption of data $x$ can be evaluated using a secret token corresponding to a predicate $f$; the user learns whether the data satisfies the predicate, i.e., whether $f(x)=1$.

Prior work on public-key predicate encryption has focused on the notion of data or plaintext privacy, the property that ciphertexts reveal no information about the encrypted data to an attacker other than what is inherently revealed by the tokens the attacker possesses. In this paper, we consider a new notion called predicate privacy, the property that tokens reveal no information about the encoded query predicate. $\color{red}{\text{Predicate privacy is inherently impossible to achieve in the public-key setting}}$ and has therefore received little attention in prior work. In this work, we consider predicate encryption in the symmetric-key setting and present a symmetric-key predicate encryption scheme which supports inner product queries. We prove that our scheme achieves both plaintext privacy and predicate privacy.

$\bullet$ I'll appreciate any explanation about background of the private/public-key setting term in functional encryption. Why did we need to define such terms?

Score:1
sb flag

Secret-key functional encryption is a very natural primitive to study! Historically, functional encryption generalized attribute-based encryption which in turn generalized identity-based encryption. You are right that functional encryption was first studied in the public key setting, however, it is just as natural to consider the secret-key variant. For example, in [1], the authors list some applications for (function hiding) secret-key functional encryption, including private database search and secure linear regressions. Concretely, imagine that you are communicating with someone using encrypted email (secret-key encrypted) because you don't want the email server (e.g., Google) to read your email. However, you still want Google to run a spam detector over your encrypted emails. If you use secret-key functional encryption, then Google would still be able to run the spam classifer $f$ without learning your email contents. Both public-key and secret-key functional encryption can be a good fit for this problem (at least in theory).

It is also natural to consider single-input and multi-input variants of these primitives (regardless of whether we are in the secret-key or public-key setting). Indeed, in [2], the authors show how one can go from single-input to multi-input generically. We can also consider whether the function is hidden from the evaluator or not. These are orthogonal features we can ask for in the functional encryption scheme, and can be surprisingly powerful. For example, in [3], the authors show that a function-hiding secret-key functional encryption scheme satisfying certain "succinctness" properties implies indistinguishability obfuscation, the "crown jewel" of cryptography!

In summary, both secret-key and public-key functional encryption are very useful and powerful abstractions in cryptography. Additionally, we can ask for multi-input and function hiding properties when constructing these primitives.

[1] Function-Hiding Inner Product Encryption is Practical

[2] Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

[3] From Minicrypt to Obfustopia via Private-Key Functional Encryption

user1035648 avatar
pt flag
In the 1st paragraph, it's written that both secret- and public-key setting of FE can be used. OK, _what are the differences in this example_? In a public-key FE scheme, we have a master secret key for central authority, a master public key, secret functional decryption keys for users. Like IP-FE of [ALS'Crypto2016](https://eprint.iacr.org/2015/608). Now, in private-key FE, what do we have? **Does private-key settings mean function hiding** as in the abstract of [SSW'TCC2009](https://www.iacr.org/archive/tcc2009/54440456/54440456.pdf)?
Score:0
pt flag

If one wants the first time, the term "symmetric-key setting" have been used for functional encryption, maybe this paper [Emily Shen, Elaine Shi, and Brent Waters. "Predicate Privacy in Encryption Systems," in TCC 2009, IACR 2008/536] be helpful.

Abstract of [SSB09]:


enter image description here


I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.