Adaptively Secure Distributed PRFs from $$\textsf {LWE}$$

نویسندگان

چکیده

In distributed pseudorandom functions (DPRFs), a PRF secret key SK is shared among N servers so that each server can locally compute partial evaluation of the on some input X. A combiner collects t evaluations then reconstruct F(SK, X) under initial key. So far, all non-interactive constructions in standard model are based lattice assumptions. One caveat they only known to be secure static corruption setting, where adversary chooses corrupt at very beginning game, before any query. this work, we construct first fully adaptively DPRF model. Our construction proved $$\textsf {LWE}$$ assumption against adversaries may decide which want corrupt. We also extend our order achieve robustness malicious adversaries.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)

Adaptively secure Multi-Party Computation (MPC) is an essential and fundamental notion in cryptography. In this work, we construct Universally Composable (UC) MPC protocols that are adaptively secure against all-but-one corruptions based on LWE. Our protocols have a constant number of rounds and communication complexity dependant only on the length of the inputs and outputs (it is independent o...

متن کامل

Private Constrained PRFs (and More) from LWE

In a constrained PRF, the owner of the PRF key K can generate constrained keys Kf that allow anyone to evaluate the PRF on inputs x that satisfy the predicate f (namely, where f(x) is “true”) but reveal no information about the PRF evaluation on the other inputs. A private constrained PRF goes further by requiring that the constrained key Kf hides the predicate f . Boneh, Kim and Montgomery (EU...

متن کامل

Constraint-Hiding Constrained PRFs for NC1 from LWE

Constraint-hiding constrained PRFs (CHCPRFs), initially studied by Boneh, Lewi and Wu [PKC 2017], are constrained PRFs where the constrained key hides the description of the constraint. Envisioned with powerful applications such as searchable encryption, private-detectable watermarking and symmetric deniable encryption, the only known candidates of CHCPRFs are based on indistinguishability obfu...

متن کامل

Adaptively-Secure Distributed Public-Key Systems

When attacking a distributed protocol, an adaptive adversary is able to determine its actions (e.g., which parties to corrupt) at any time based on its entire view of the protocol including the entire communication history. Proving security of cryptographic protocols against adaptive adversaries is a fundamental problem in cryptography. In this paper, we consider distributed public-key systems ...

متن کامل

Lecture 5 , CPA Secure Encryption from PRFs

Ralling: CPA Security and Randomized Encryption. Last time, we discussed CPA Security and how it allows more power to the adversary compared to the “single-message” indistinguishability-based definitions. The security goal here is that, as long as the adversary is computationally bounded (to polynomial time computation), they cannot guess the message that is being encrypted. More formally, our ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptology

سال: 2021

ISSN: ['0933-2790', '1432-1378']

DOI: https://doi.org/10.1007/s00145-021-09393-0