Abstract. We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our protocol needs only O(1) communication rounds. It tolerates up to (n − 1)/2 of n dishonest servers in the semi-honest environment. Many protocols that use PRPs (e.g., a CBC block cipher mode) can now be translated into the distributed setting. Our main technique for constructing invertible threshold PRPs is a distributed Luby-Rackoff construction where both the secret keys and the input are shared among the servers. We also present protocols for obliviously computing pseudo-random functions by Naor-Reingold [37] and Dodis-Yampolskiy [24] with shared input and keys
\ua9 2019, Springer Nature Switzerland AG. Distributed pseudorandom functions (DPRFs) formally defin...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali [9], allow one to e#c...
We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our pro...
are one of the fundamental primitives for cryptographic protocol design. Most importantly, they prov...
Abstract Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a p...
Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-ran...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Abstract. We present a pseudo-random bit generator expanding a uniformly random bit-string r of leng...
Abstract. We describe efficient constructions for various cryptographic primitives in private-key as...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Abstract We show how to construct pseudo-random permutations that satisfy a certain cycle restrictio...
AbstractA pseudo-random function is a fundamental cryptographic primitive that is essential for encr...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
Abstract. We present PEP, which is a new construction of a tweak-able strong pseudo-random permutati...
\ua9 2019, Springer Nature Switzerland AG. Distributed pseudorandom functions (DPRFs) formally defin...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali [9], allow one to e#c...
We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our pro...
are one of the fundamental primitives for cryptographic protocol design. Most importantly, they prov...
Abstract Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a p...
Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-ran...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
Abstract. We present a pseudo-random bit generator expanding a uniformly random bit-string r of leng...
Abstract. We describe efficient constructions for various cryptographic primitives in private-key as...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Abstract We show how to construct pseudo-random permutations that satisfy a certain cycle restrictio...
AbstractA pseudo-random function is a fundamental cryptographic primitive that is essential for encr...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
Abstract. We present PEP, which is a new construction of a tweak-able strong pseudo-random permutati...
\ua9 2019, Springer Nature Switzerland AG. Distributed pseudorandom functions (DPRFs) formally defin...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali [9], allow one to e#c...