\ua9 2019, Springer Nature Switzerland AG. Distributed pseudorandom functions (DPRFs) formally defined by Naor et al. (EUROCRYPT’99) provide the properties of regular PRFs as well as the ability to distribute the evaluation of the PRF function; rendering them useful against single point of failures in multiple settings (e.g., key distribution centres). To avoid the corruption of the partial PRF values computed by distributed servers, Naor et al. proposed the notion of robust distributed PRFs, which not only allows the evaluation of the PRF value by a set of distributed servers, but also allows to verify if the partial evaluation values are computed correctly. In this paper, we investigate different approaches to build non-interactive robust...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
International audienceSince its introduction, pseudorandom functions (PRFs) have become one of the m...
A software watermarking scheme can embed a message into a program while preserving its functionality...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
International audienceIn distributed pseudorandom functions (DPRFs), a PRF secret key SK is secret s...
We provide a systematic analysis of two related multiparty protocols, namely (Non-Interactive Fully)...
We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivia...
We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to an untrust...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Recently, program obfuscation has proven to be an extremely powerful tool and has been used to const...
Abstract. We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
International audienceSince its introduction, pseudorandom functions (PRFs) have become one of the m...
A software watermarking scheme can embed a message into a program while preserving its functionality...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
International audienceIn distributed pseudorandom functions (DPRFs), a PRF secret key SK is secret s...
We provide a systematic analysis of two related multiparty protocols, namely (Non-Interactive Fully)...
We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivia...
We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to an untrust...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
We investigate, in a concrete security setting, several alternate characterizations of pseudorandom ...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Recently, program obfuscation has proven to be an extremely powerful tool and has been used to const...
Abstract. We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP...
This paper fills an important foundational gap with the first proofs, under standard assumptions and...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
International audienceSince its introduction, pseudorandom functions (PRFs) have become one of the m...
A software watermarking scheme can embed a message into a program while preserving its functionality...