Number-theoretic constructions of efficient pseudo-random functions

From MaRDI portal
Publication:3168269

DOI10.1145/972639.972643zbMath1248.94086OpenAlexW2124218043MaRDI QIDQ3168269

Moni Naor, Omer Reingold

Publication date: 30 October 2012

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/972639.972643




Related Items

Polynomial interpolation of the Naor-Reingold pseudo-random functionStatistical Randomized Encodings: A Complexity Theoretic ViewMultilinear Pseudorandom FunctionsAdaptively secure distributed PRFs from LWEExploring crypto dark matter: new simple PRF candidates and their applicationsA brief and understandable guide to pseudo-random number generators and specific models for securityExtended dual system group and shorter unbounded hierarchical identity based encryptionLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ New Proof for BKP IBE Scheme and Improvement in the MIMC SettingFrom Selective to Adaptive Security in Functional EncryptionThe multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signaturesMinimizing nfa's and regular expressionsPerformance improvement for the GGM-construction of pseudorandom functionsSecure parameterized pattern matchingMaking Private Function Evaluation Safer, Faster, and SimplerGeneral linear group action on tensors: a candidate for post-quantum cryptographyPrivate set intersection: new generic constructions and feasibility resultsTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessBatch verifiable computation of outsourced functionsThe pervasive reach of resource-bounded Kolmogorov complexity in computational complexity theoryTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingEnd-to-end secure messaging with traceability only for illegal contentCount me in! Extendability for threshold ring signaturesScooby: improved multi-party homomorphic secret sharing based on FHEAdaptive-Secure VRFs with Shorter Keys from Static AssumptionsBeyond Uber: instantiating generic groups via PGGsScooby: improved multi-party homomorphic secret sharing based on FHEOn the linear complexity of the Naor-Reingold sequenceALBATROSS: publicly AttestabLe BATched Randomness based On Secret SharingOblivious pseudorandom functions from isogeniesSiGamal: a supersingular isogeny-based PKE and its application to a PRFProvably-secure time-bound hierarchical key assignment schemesEfficient set operations in the presence of malicious adversariesA one-time stegosystem and applications to efficient covert communicationOn the Hardness of Determining Small NFA’s and of Proving Lower Bounds on Their SizesMcCulloch-Pitts Brains and Pseudorandom FunctionsReconstructing Generalized Staircase Polygons with Uniform Step LengthSubliminal Hash ChannelsDistributed Pseudorandom Functions for General Access Structures in NPNew algorithms and lower bounds for circuits with linear threshold gatesA convertible multi-authenticated encryption scheme for group communicationsPseudo-Derandomizing Learning and ApproximationNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemThe communication complexity of additionPolynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functionsConstraining Pseudorandom Functions PrivatelyTightly Secure IBE Under Constant-Size Master Public KeyOn the period of the Naor-Reingold sequenceOn the uniformity of distribution of the Naor-Reingold pseudo-random functionOn the linear complexity of the Naor-Reingold sequence with elliptic curvesEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesVerifiable random functions from non-interactive witness-indistinguishable proofsSimple and generic constructions of succinct functional encryptionVerifiable Random Functions from Standard AssumptionsMulti-theorem preprocessing NIZKs from latticesEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesNatural Proofs versus DerandomizationAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Compact designated verifier NIZKs from the CDH assumption without pairingsGroup signatures with user-controlled and sequential linkabilityVerifiable random functions with optimal tightnessBreaking the Circuit Size Barrier for Secure Computation Under DDHInteractive Clustering of Linear Classes and Cryptographic Lower BoundsUnnamed ItemPublic-Key Encryption Schemes with Auxiliary InputsSynthesizers and their application to the parallel construction of pseudo-random functionsQuantum Hardness of Learning Shallow Classical CircuitsAdaptively secure constrained pseudorandom functions in the standard modelPseudorandom Functions: Three Decades LaterHow to Simulate It – A Tutorial on the Simulation Proof TechniqueDistribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random FunctionAdaptive PartitioningOn the distribution of the Diffie-Hellman pairsA \#SAT algorithm for small constant-depth circuits with PTF gates