## CryptoDB

### Paper: Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p

Authors: Guilhem Castagnos Fabien Laguillaumie Ida Tucker DOI: 10.1007/978-3-030-03329-3_25 Search ePrint Search Google Slides ASIACRYPT 2018 Functional encryption (FE) is a modern public-key cryptographic primitive allowing an encryptor to finely control the information revealed to recipients from a given ciphertext. Abdalla, Bourse, De Caro, and Pointcheval (PKC 2015) were the first to consider FE restricted to the class of linear functions, i.e. inner products. Though their schemes are only secure in the selective model, Agrawal, Libert, and Stehlé (CRYPTO 16) soon provided adaptively secure schemes for the same functionality. These constructions, which rely on standard assumptions such as the Decision Diffie-Hellman ( $\mathsf {DDH}$ ), the Learning-with-Errors ( $\mathsf {LWE}$ ), and Paillier’s Decision Composite Residuosity (DCR) problems, do however suffer of various practical drawbacks. Namely, the DCR based scheme only computes inner products modulo an RSA integer which is oversized for many practical applications, while the computation of inner products modulo a prime p either requires, for their $\mathsf {DDH}$ based scheme, that the inner product be contained in a sufficiently small interval for decryption to be efficient, or, as in the $\mathsf {LWE}$ based scheme, suffers of poor efficiency due to impractical parameters.In this paper, we provide adaptively secure FE schemes for the inner product functionality which are both efficient and allow for the evaluation of unbounded inner products modulo a prime p. Our constructions rely on new natural cryptographic assumptions in a cyclic group containing a subgroup where the discrete logarithm ( $\mathsf {DL}$ ) problem is easy which extend Castagnos and Laguillaumie’s assumption (RSA 2015) of a $\mathsf {DDH}$ group with an easy $\mathsf {DL}$ subgroup. Instantiating our generic constructions using class groups of imaginary quadratic fields gives rise to the most efficient FE for inner products modulo an arbitrary large prime p. One of our schemes outperforms the DCR variant of Agrawal et al.’s protocols in terms of size of keys and ciphertexts by factors varying between 2 and 20 for a 112-bit security.
##### BibTeX
@inproceedings{asiacrypt-2018-29181,
title={Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p},
booktitle={Advances in Cryptology – ASIACRYPT 2018},
series={Lecture Notes in Computer Science},
publisher={Springer},
volume={11273},
pages={733-764},
doi={10.1007/978-3-030-03329-3_25},
author={Guilhem Castagnos and Fabien Laguillaumie and Ida Tucker},
year=2018
}