Abstract

Constrained verifiable random functions (VRFs) were introduced by Fuchsbauer. In a constrained VRF, one can drive a constrained key skS from the master secret key sk, where S is a subset of the domain. Using the constrained key skS, one can compute function values at points which are not in the set S. The security of constrained VRFs requires that the VRFs’ output should be indistinguishable from a random value in the range. They showed how to construct constrained VRFs for the bit-fixing class and the circuit constrained class based on multilinear maps. Their construction can only achieve selective security where an attacker must declare which point he will attack at the beginning of experiment. In this work, we propose a novel construction for constrained verifiable random function from bilinear maps and prove that it satisfies a new security definition which is stronger than the selective security. We call it semiadaptive security where the attacker is allowed to make the evaluation queries before it outputs the challenge point. It can immediately get that if a scheme satisfied semiadaptive security, and it must satisfy selective security.

Highlights

  • Pseudorandom functions (PRFs) are one of the basic concepts in modern cryptography, which were introduced by Goldreich et al [1]

  • We reduce weak Bilinear Diffie–Hellman Inversion (BDHI) assumption to the pseudorandomness of constrained veri able random functions (VRFs)

  • We say that the weak bilinear Diffie–Hellman inversion problem is hard if for all polynomial probabilistic time (PPT) A, AdvBADHI is negligible in λ

Read more

Summary

Introduction

Pseudorandom functions (PRFs) are one of the basic concepts in modern cryptography, which were introduced by Goldreich et al [1]. Given a constrained key skS for a set S ⊂ X, the algorithm Prove computes a value y F(sk, x) associated with a prove π which can be used to verify the correctness of y F(sk, x) by the public key pk. E pseudorandomness requires that the evaluation of F(sk, x) should be indistinguishable from a random value, even if the adversary is given several constrained keys for subset. Sq1 ⊂ X and several function values associated with proofs at points x ∈ ∩ qj 1 1Sj. A possible application of constrained VRFs is micropayments [8]. Inspired by the constrained PRFs of Hohenberber et al [9], we construct a VRF with constrained keys for any sets of polynomial size and define a new security named semiadaptive security.

Preliminaries
Definition
Construction
Properties
Constrained Verifiable Random Function
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.