We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to an untrusted proxy and introduce a novel cryptographic primitive called delegatable pseudorandom functions, or DPRFs for short: A DPRF enables a proxy to evaluate a pseudorandom function on a strict subset of its domain using a trapdoor derived from the DPRF secret key. The trapdoor is constructed with respect to a certain policy predicate that determines the subset of input values which the proxy is allowed to compute. The main challenge in constructing DPRFs is to achieve bandwidth efficiency (which mandates that the trapdoor is smaller than the precomputed sequence of the PRF values conforming to the predicate), while maintaining the pseudorandomnes...
With the proliferation of physical attacks the implicit as-sumptions made in traditional security mo...
Abstract. With the proliferation of physical attacks the implicit as-sumptions made in traditional s...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
In a constrained pseudorandom function (PRF), the holder of the master secret key can derive constra...
We provide a systematic analysis of two related multiparty protocols, namely (Non-Interactive Fully)...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
\ua9 2019, Springer Nature Switzerland AG. Distributed pseudorandom functions (DPRFs) formally defin...
We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivia...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
Abstract. Constrained pseudorandom functions have recently been introduced independently by Boneh an...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
With the proliferation of physical attacks the implicit as-sumptions made in traditional security mo...
Abstract. With the proliferation of physical attacks the implicit as-sumptions made in traditional s...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
In a constrained pseudorandom function (PRF), the holder of the master secret key can derive constra...
We provide a systematic analysis of two related multiparty protocols, namely (Non-Interactive Fully)...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
\ua9 2019, Springer Nature Switzerland AG. Distributed pseudorandom functions (DPRFs) formally defin...
We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivia...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
Abstract. Constrained pseudorandom functions have recently been introduced independently by Boneh an...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
With the proliferation of physical attacks the implicit as-sumptions made in traditional security mo...
Abstract. With the proliferation of physical attacks the implicit as-sumptions made in traditional s...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...