International audienceIn distributed pseudorandom functions (DPRFs), a PRF secret key SK is secret shared among N servers so that each server can locally compute a partial evaluation of the PRF on some input X. A combiner that collects t partial evaluations can then reconstruct the evaluation F (SK, X) of the PRF under the initial secret key. So far, all non-interactive constructions in the standard model are based on lattice assumptions. One caveat is that they are only known to be secure in the static corruption setting, where the adversary chooses the servers to corrupt at the very beginning of the game, before any evaluation query. In this work, we construct the first fully non-interactive adaptively secure DPRF in the standard model. O...
Building cryptographic primitives that are secure against related-key attacks (RKAs) is a well-studi...
A pseudorandom function F: K ×X → Y is said to be key homomorphic if given F (k1, x) and F (k2, x) t...
Pseudo-random functions are a useful cryptographic primitive that, can be combined with zero-knowled...
International audienceIn distributed pseudorandom functions (DPRFs), a PRF secret key SK is secret s...
\ua9 2019, Springer Nature Switzerland AG. Distributed pseudorandom functions (DPRFs) formally defin...
A private puncturable pseudorandom function (PRF) enables one to create a constrained version of a P...
We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivia...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Abstract. Constrained pseudorandom functions have recently been introduced independently by Boneh an...
In this thesis, we study the security of advanced cryptographic primitives against adversaries that ...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to an untrust...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
Building cryptographic primitives that are secure against related-key attacks (RKAs) is a well-studi...
A pseudorandom function F: K ×X → Y is said to be key homomorphic if given F (k1, x) and F (k2, x) t...
Pseudo-random functions are a useful cryptographic primitive that, can be combined with zero-knowled...
International audienceIn distributed pseudorandom functions (DPRFs), a PRF secret key SK is secret s...
\ua9 2019, Springer Nature Switzerland AG. Distributed pseudorandom functions (DPRFs) formally defin...
A private puncturable pseudorandom function (PRF) enables one to create a constrained version of a P...
We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivia...
Distributed pseudorandom functions (DPRFs) originally introduced by Naor, Pinkas and Reingold (EUROC...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Abstract. Constrained pseudorandom functions have recently been introduced independently by Boneh an...
In this thesis, we study the security of advanced cryptographic primitives against adversaries that ...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to an untrust...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
Building cryptographic primitives that are secure against related-key attacks (RKAs) is a well-studi...
A pseudorandom function F: K ×X → Y is said to be key homomorphic if given F (k1, x) and F (k2, x) t...
Pseudo-random functions are a useful cryptographic primitive that, can be combined with zero-knowled...