Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PRFs) from the Learning with Errors (LWE) assumption by embedding combinatorial objects, a path and a tree respectively, in instances of the LWE problem. In this work, we show how to generalize this approach to embed circuits, inspired by recent progress in the study of Attribute Based Encryption. Embedding a universal circuit for some class of functions allows us to produce constrained keys for functions in this class, which gives us the first standard-lattice-assumption-based con-strained PRF (CPRF) for general bounded-description bounded-depth functions, for arbitrary polynomial bounds on the description size and the depth. (A constrained ke...
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function w...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
Abstract. A pseudorandom function (PRF) is a keyed function F: K × X → Y where, for a random key k ∈...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
A constrained pseudorandom function F: K × X → Y for family of subsets of X is a function where for ...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
In a constrained pseudorandom function (PRF), the holder of the master secret key can derive constra...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function w...
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function w...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
A key-homomorphic pseudorandom function (PRF) family {Fs: D → R} allows one to efficiently compute t...
Abstract. A pseudorandom function (PRF) is a keyed function F: K × X → Y where, for a random key k ∈...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
A constrained pseudorandom function F: K × X → Y for family of subsets of X is a function where for ...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
In a constrained pseudorandom function (PRF), the holder of the master secret key can derive constra...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function w...
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function w...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...