Efficient Pseudorandom Functions via On-the-Fly Adaptation

نویسندگان

  • Nico Döttling
  • Dominique Schröder
چکیده

Pseudorandom functions (PRFs) are one of the most fundamental building blocks in cryptography with numerous applications such as message authentication codes and private key encryption. In this work, we propose a new framework to construct PRFs with the overall goal to build efficient PRFs from standard assumptions with an almost tight proof of security. The main idea of our framework is to start from a PRF for any small domain (i.e. poly-sized domain) and turn it into an `-bounded pseudorandom function, i.e., into a PRF whose outputs are pseudorandom for the first ` distinct queries to F . In the second step, we apply a novel technique which we call on-the-fly adaptation that turns any bounded PRF into a fully-fledged (large domain) PRF. Both steps of our framework have a tight security reduction, meaning that any successful attacker can be turned into an efficient algorithm for the underlying hard computational problem without any significant increase in the running time or loss of success probability. Instantiating our framework with specific number theoretic assumptions, we construct a PRF based on k-LIN (and thus DDH) that is faster than all known constructions, which reduces almost tightly to the underlying problem, and which has shorter keys. Instantiating our framework with general assumptions, we construct a PRF with very flat circuits whose security tightly reduces to the security of some small domain PRF.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function

This article discusses the provable security of pseudorandom-function (PRF) modes of an iterated hash function using a block cipher. The iterated hash function uses the Matyas-Meyer-Oseas (MMO) mode for the compression function and the Merkle-Damgård with a permutation (MDP) for the domain extension transform. It is shown that the keyed-via-IV mode and the key-prefix mode of the iterated hash f...

متن کامل

Range Extension for Weak PRFs; The Good, the Bad, and the Ugly

We investigate a general class of (black-box) constructions for range extension of weak pseudorandom functions: a construction based on m independent functions F1, . . . , Fm is given by a set of strings over {1, . . . , m}, where for example {〈2〉, 〈1, 2〉} corresponds to the function X 7→ [F2(X), F2(F1(X))]. All efficient constructions for range expansion of weak pseudorandom functions that we ...

متن کامل

Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions

In their seminal paper [HILL99], H̊astad, Impagliazzo, Levin and Luby show that a pseudorandom generator can be constructed from any one-way function. This plausibility result is one of the most fundamental theorems in cryptography and helps shape our understanding of hardness and randomness in the field. Unfortunately, the reduction of [HILL99] is not nearly as efficient nor as security preserv...

متن کامل

Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security

Pseudorandom function families are a powerful cryptographic primitive, yielding, in particular, simple solutions for the main problems in private key cryptography. Their existence based on general assumptions (namely, the existence of one-way functions) has been established. In this work we investigate new ways of designing pseudorandom function families. The goal is to find constructions that ...

متن کامل

Cs 600.442 – Modern Cryptography 2 Pseudorandom Functions (prf)

PRG with 1-bit stretch can be constructed using hard-core predicates. PRG with poly stretch can be constructed using PRG with 1-bit stretch. In order to generate exponentially long pseudorandom strings we need an efficient indexing mechanism (functions) that can index exponentially long pseudorandom strings. We will do this by using the notion of Pseudorandom functions. But before that let us r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015