Pseudorandom functions: Three decades later

35Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In 1984, Goldreich, Goldwasser and Micali formalized the concept of pseudorandom functions and proposed a construction based on any length-doubling pseudorandom generator. Since then, pseudorandom functions have turned out to be an extremely influential abstraction, with applications ranging from message authentication to barriers in proving computational complexity lower bounds. In this tutorial we survey various incarnations of pseudorandom functions, giving self-contained proofs of key results from the literature. Our main focus is on feasibility results and constructions, as well as on limitations of (and induced by) pseudorandom functions. Along the way we point out some open questions that we believe to be within reach of current techniques.

Cite

CITATION STYLE

APA

Bogdanov, A., & Rosen, A. (2017). Pseudorandom functions: Three decades later. In Information Security and Cryptography (Vol. 0, pp. 79–158). Springer International Publishing. https://doi.org/10.1007/978-3-319-57048-8_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free