Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aayush Jain is active.

Publication


Featured researches published by Aayush Jain.


international cryptology conference | 2016

Verifiable Functional Encryption

Saikrishna Badrinarayanan; Vipul Goyal; Aayush Jain; Amit Sahai

In light of security challenges that have emerged in a world with complex networks and cloud computing, the notion of functional encryption has recently emerged. In this work, we show that in several applications of functional encryption even those cited in the earliest works on functional encryption, the formal notion of functional encryption is actually not sufficient to guarantee security. This is essentially because the case of a malicious authority and/or encryptor is not considered. To address this concern, we put forth the concept of verifiable functional encryption, which captures the basic requirement of output correctness: even if the ciphertext is maliciously generated and even if the setup and key generation is malicious, the decryptor is still guaranteed a meaningful notion of correctness which we show is crucial in several applications. We formalize the notion of verifiable function encryption and, following prior work in the area, put forth a simulation-based and an indistinguishability-based notion of security. We show that simulation-based verifiable functional encryption is unconditionally impossible even in the most basic setting where there may only be a single key and a single ciphertext. We then give general positive results for the indistinguishability setting: a general compiler from any functional encryption scheme into a verifiable functional encryption scheme with the only additional assumption being the Decision Linear Assumption over Bilinear Groups DLIN. We also give a generic compiler in the secret-key setting for functional encryption which maintains both message privacy and function privacy. Our positive results are general and also apply to other simpler settings such as Identity-Based Encryption, Attribute-Based Encryption and Predicate Encryption. We also give an application of verifiable functional encryption to the recently introduced primitive of functional commitments. Finally, in the context of indistinguishability obfuscation, there is a fundamental question of whether the correct program was obfuscated. In particular, the recipient of the obfuscated program needs a guarantee that the program indeed does what it was intended to do. This question turns out to be closely related to verifiable functional encryption. We initiate the study of verifiable obfuscation with a formal definition and construction of verifiable indistinguishability obfuscation.


theory and application of cryptographic techniques | 2017

Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption

Prabhanjan Ananth; Aayush Jain; Amit Sahai

Indistinguishability Obfuscation (iO) has enabled an incredible number of new and exciting applications. However, our understanding of how to actually build secure iO remains in its infancy. While many candidate constructions have been published, some have been broken, and it is unclear which of the remaining candidates are secure.


security and cryptography for networks | 2018

Non-trivial Witness Encryption and Null-iO from Standard Assumptions

Zvika Brakerski; Aayush Jain; Ilan Komargodski; Alain Passelègue; Daniel Wichs

A witness encryption (WE) scheme can take any \({{\textsf {NP}}}\) statement as a public-key and use it to encrypt a message. If the statement is true then it is possible to decrypt the message given a corresponding witness, but if the statement is false then the message is computationally hidden. Ideally, the encryption procedure should run in polynomial time, but it is also meaningful to define a weaker notion, which we call non-trivially exponentially efficient WE (XWE), where the encryption run-time is only required to be much smaller than the trivial \(2^{m}\) bound for \({{\textsf {NP}}}\) relations with witness size m. We show how to construct such XWE schemes for all of \({{\textsf {NP}}}\) with encryption run-time \(2^{m/2}\) under the sub-exponential learning with errors (LWE) assumption. For \({{\textsf {NP}}}\) relations that can be verified in \({{\textsf {NC}}^1}\) (e.g., SAT) we can also construct such XWE schemes under the sub-exponential Decisional Bilinear Diffie-Hellman (DBDH) assumption. Although we find the result surprising, it follows via a very simple connection to attribute-based encryption.


international cryptology conference | 2018

Threshold Cryptosystems from Threshold Fully Homomorphic Encryption

Dan Boneh; Rosario Gennaro; Steven Goldfeder; Aayush Jain; Sam Kim; Peter M. R. Rasmussen; Amit Sahai

We develop a general approach to adding a threshold functionality to a large class of (non-threshold) cryptographic schemes. A threshold functionality enables a secret key to be split into a number of shares, so that only a threshold of parties can use the key, without reconstructing the key. We begin by constructing a threshold fully-homomorphic encryption scheme (ThFHE) from the learning with errors (LWE) problem. We next introduce a new concept, called a universal thresholdizer, from which many threshold systems are possible. We show how to construct a universal thresholdizer from our ThFHE. A universal thresholdizer can be used to add threshold functionality to many systems, such as CCA-secure public-key encryption (PKE), signature schemes, pseudorandom functions, and others primitives. In particular, by applying this paradigm to a (non-threshold) lattice signature system, we obtain the first single-round threshold signature scheme from LWE.


international cryptology conference | 2016

Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption

Prabhanjan Ananth; Aayush Jain; Moni Naor; Amit Sahai; Eylon Yogev


ITCS | 2017

Hierarchical Functional Encryption.

Zvika Brakerski; Nishanth Chandran; Vipul Goyal; Aayush Jain; Amit Sahai; Gil Segev


IACR Cryptology ePrint Archive | 2016

Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security.

Prabhanjan Ananth; Aayush Jain; Moni Naor; Amit Sahai; Eylon Yogev


IACR Cryptology ePrint Archive | 2015

Functional Encryption: Decentralised and Delegatable.

Nishanth Chandran; Vipul Goyal; Aayush Jain; Amit Sahai


IACR Cryptology ePrint Archive | 2017

Threshold Fully Homomorphic Encryption.

Aayush Jain; Peter M. R. Rasmussen; Amit Sahai


international cryptology conference | 2016

Multi-input Functional Encryption with Unbounded-Message Security

Vipul Goyal; Aayush Jain; Adam O'Neill

Collaboration


Dive into the Aayush Jain's collaboration.

Top Co-Authors

Avatar

Amit Sahai

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zvika Brakerski

Weizmann Institute of Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge