A Verifiable Random Function with Short Proofs and Keys
نویسندگان
چکیده
We give a simple and efficient construction of a verifiable random function (VRF) on groups equipped with a bilinear mapping. Our construction is direct; it bypasses an expensive Goldreich-Levin transformation from a unique signature to a VRF in contrast to prior works of Micali-Rabin-Vadhan [MRV99] and Lysyanskaya [Lys02]. Our proofs of security are based on a decisional bilinear Diffie-Hellman inversion assumption (DBDHI), previously used in [BB04a] to construct an identity based encryption scheme. Our VRF’s proofs and keys have constant size in contrast to proofs and keys of VRFs in [Lys02] and [Dod03], which are linear in the size of the message. We operate over an elliptic group, which is significantly shorter than the multiplicative group Z∗n used in [MRV99], yet we achieve the same security. Furthermore, our scheme can be made distributed and proactive.
منابع مشابه
Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
Verifiable random functions are pseudorandom functions producing publicly verifiable proofs for their outputs, allowing for efficient checks of the correctness of their computation. In this work, we introduce a new computational hypothesis, the n-Eigen-Value assumption, which can be seen as a relaxation of the Un MDDH assumption, and prove its equivalence with the n-Rank assumption. Based on th...
متن کاملOn the Impossibility of Structure-Preserving Deterministic Primitives
Complex cryptographic protocols are often constructed in a modular way from primitives such as signatures, commitments, and encryption schemes, verifiable random functions, etc. together with zero-knowledge proofs ensuring that these primitives are properly orchestrated by the protocol participants. Over the past decades a whole framework of discrete logarithm based primitives has evolved. This...
متن کاملAsymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
In this paper, we focus on the constructions of adaptively secure identity-based encryption (IBE) from lattices and verifiable random function (VRF) with large input spaces. Existing constructions of these primitives suffer from low efficiency, whereas their counterparts with weaker guarantees (IBEs with selective security and VRFs with small input spaces) are reasonably efficient. We try to fi...
متن کاملPrimary-Secondary-Resolver Membership Proof Systems
We consider Primary-Secondary-Resolver Membership Proof Systems (PSR for short) and show different constructions of that primitive. A PSR system is a 3-party protocol, where we have a primary, which is a trusted party which commits to a set of members and their values, then generates public and secret keys in order for secondaries (provers with knowledge of both keys) and resolvers (verifiers w...
متن کاملConstrained Verifiable Random Functions
We extend the notion of verifiable random functions (VRF) to constrained VRFs, which generalize the concept of constrained pseudorandom functions, put forward by Boneh and Waters (Asiacrypt’13), and independently by Kiayias et al. (CCS’13) and Boyle et al. (PKC’14), who call them delegatable PRFs and functional PRFs, respectively. In a standard VRF the secret key sk allows one to evaluate a pse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2004 شماره
صفحات -
تاریخ انتشار 2004