Adaptively Secure Constrained Pseudorandom Functions

7Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature that the (master) secret key holder, having secret key K, can produce a constrained key, that allows for the evaluation of the PRF on a subset of the domain as determined by a predicate function f within some family. While previous constructions gave constrained PRFs for poly-sized circuits, all reductions for such functionality were based in the selective model of security where an attacker declares which point he is attacking before seeing any constrained keys. In this paper we give new constrained PRF constructions for arbitrary circuits in the random oracle model based on indistinguishability obfuscation. Our solution is constructed from two recently emerged primitives: an adaptively secure Attribute-Based Encryption (ABE) for circuits and a Universal Sampler Scheme as introduced by Hofheinz et al. Both primitives are constructible from indistinguishability obfuscation (and injective pseudorandom generators) with only polynomial loss.

Cite

CITATION STYLE

APA

Hofheinz, D., Kamath, A., Koppula, V., & Waters, B. (2019). Adaptively Secure Constrained Pseudorandom Functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11598 LNCS, pp. 357–376). Springer. https://doi.org/10.1007/978-3-030-32101-7_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free