*Constrained* pseudorandom functions allow for delegating ``constrained\u27\u27 secret keys that let one compute the function at certain authorized inputs---as specified by a constraining predicate---while keeping the function value at unauthorized inputs pseudorandom. In the *constraint-hiding* variant, the constrained key hides the predicate. On top of this, *programmable* variants allow the delegator to explicitly set the output values yielded by the delegated key for a particular set of unauthorized inputs. Recent years have seen rapid progress on applications and constructions of these objects for progressively richer constraint classes, resulting most recently in constraint-hiding constrained PRFs for arbitrary polynomial-time cons...
Privately Constrained Pseudorandom Functions allow a PRF key to be delegated to some evaluator in a...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...
In a constrained pseudorandom function (PRF), the master secret key can be used to derive constraine...
In a constrained PRF, the owner of the PRF key K can generate constrained keys K_f that allow anyone...
In a constrained pseudorandom function (PRF), the holder of the master secret key can derive constra...
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function (PRF) is a secure PRF for which one can generate constrained key...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
In this paper, we build a framework for constructing Constrained Pseudorandom Functions (CPRFs) with...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
A constrained pseudorandom function F: K × X → Y for family of subsets of X is a function where for ...
Privately Constrained Pseudorandom Functions allow a PRF key to be delegated to some evaluator in a...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...
In a constrained pseudorandom function (PRF), the master secret key can be used to derive constraine...
In a constrained PRF, the owner of the PRF key K can generate constrained keys K_f that allow anyone...
In a constrained pseudorandom function (PRF), the holder of the master secret key can derive constra...
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function F: K × X → Y for a family T ⊆ 2X of subsets of X is a function w...
A constrained pseudorandom function (PRF) is a secure PRF for which one can generate constrained key...
Constrained pseudorandom functions (introduced independently by Boneh and Waters (CCS 2013), Boyle, ...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
A pseudorandom function (PRF) is a keyed function F : K × X → Y where, for a random key k ∈ K, the f...
In this paper, we build a framework for constructing Constrained Pseudorandom Functions (CPRFs) with...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
A constrained pseudorandom function F: K × X → Y for family of subsets of X is a function where for ...
Privately Constrained Pseudorandom Functions allow a PRF key to be delegated to some evaluator in a...
A constrained pseudorandom function (CPRF) PRF allows to derive constrained evaluation keys that onl...
Note. This is an out of date draft and here for reference only. This paper has been superseded and r...