A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function where for any key k ∈ K and set S ∈ T one can efficiently compute a constrained key kS which allows to evaluate F (k, ·) on all inputs x ∈ S, while even given this key, the outputs on all inputs x ∉ S look random. At Asiacrypt’13 Boneh and Waters gave a construction which supports the most general set family so far. Its keys kc are defined for sets decided by boolean circuits C and enable evaluation of the PRF on any x ∈ X where C(x) = 1. In their construction the PRF input length and the size of the circuits C for which constrained keys can be computed must be fixed beforehand during key generation. We construct a constrained PRF that has an ...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
Abstract. A pseudorandom function (PRF) is a keyed function F: K × X → Y where, for a random key k ∈...
We define and study a new cryptographic primitive, named One-One Constrained Pseudorandom Functions....
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function F: K × X → Y for family of subsets of X is a function where for ...
A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function w...
A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function w...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
In a constrained pseudorandom function (PRF), the master secret key can be used to derive constraine...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
A constrained pseudorandom function (PRF) is a secure PRF for which one can generate constrained key...
In a constrained pseudorandom function (PRF), the holder of the master secret key can derive constra...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
Abstract. A pseudorandom function (PRF) is a keyed function F: K × X → Y where, for a random key k ∈...
We define and study a new cryptographic primitive, named One-One Constrained Pseudorandom Functions....
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function F: K × X → Y for family of subsets of X is a function where for ...
A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function w...
A constrained pseudorandom function (CPRF) F: K×X → Y for a family T of subsets of χ is a function w...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
In a constrained pseudorandom function (PRF), the master secret key can be used to derive constraine...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
A constrained pseudorandom function (PRF) is a secure PRF for which one can generate constrained key...
In a constrained pseudorandom function (PRF), the holder of the master secret key can derive constra...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
Abstract. A pseudorandom function (PRF) is a keyed function F: K × X → Y where, for a random key k ∈...
We define and study a new cryptographic primitive, named One-One Constrained Pseudorandom Functions....