메뉴 건너뛰기




Volumn , Issue , 2010, Pages 131-140

Algebraic pseudorandom functions with improved efficiency from the augmented cascade

Author keywords

Algorithms; Security; Theory

Indexed keywords

ALGEBRAIC STRUCTURES; PSEUDORANDOM FUNCTIONS; SECURITY; THEORY; VERIFIABLE RANDOM FUNCTION;

EID: 78650021967     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866323     Document Type: Conference Paper
Times cited : (53)

References (30)
  • 1
    • 67650685950 scopus 로고    scopus 로고
    • Verifiable random functions from identity-based key encapsulation
    • Michel Abdalla, Dario Catalano, and Dario Fiore. Verifiable random functions from identity-based key encapsulation. In EUROCRYPT'09, pages 554-571, 2009.
    • (2009) EUROCRYPT'09 , pp. 554-571
    • Abdalla, M.1    Catalano, D.2    Fiore, D.3
  • 2
  • 3
  • 4
    • 33749544409 scopus 로고    scopus 로고
    • New proofs for NMAC and HMAC: Security without collision-resistance
    • Mihir Bellare. New proofs for NMAC and HMAC: Security without collision-resistance. In Crypto'06, pages 602-619, 2006.
    • (2006) Crypto'06 , pp. 602-619
    • Bellare, M.1
  • 5
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying hash functions for message authentication. In CRYPTO'96, pages 1-15, 1996.
    • (1996) CRYPTO'96 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 6
    • 0030416137 scopus 로고    scopus 로고
    • Pseudorandom functions revisited: The cascade construction and its concrete security
    • Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Pseudorandom functions revisited: The cascade construction and its concrete security. In FOCS'96, 1996.
    • (1996) FOCS'96
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
    • 78650014533 scopus 로고    scopus 로고
    • Dan Bernstein. Syn cookies, 1996. http://cr.yp.to/syncookies.html.
    • (1996)
    • Bernstein, D.1
  • 8
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID identity based encryption without random oracles
    • Advances in Cryptology EUROCRYPT 2004. Springer-Verlag
    • Dan Boneh and Xavier Boyen. Efficient selective-ID identity based encryption without random oracles. In Advances in Cryptology EUROCRYPT 2004, volume 3027 of LNCS, pages 223-38. Springer-Verlag, 2004.
    • LNCS , vol.3027 , Issue.2004 , pp. 223-38
    • Boneh, D.1    Boyen, X.2
  • 9
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • Matt Franklin, editor, Advances in Cryptology CRYPTO. Springer-Verlag
    • Dan Boneh and Xavier Boyen. Secure identity based encryption without random oracles. In Matt Franklin, editor, Advances in Cryptology CRYPTO 2004, volume 3152 of LNCS, pages 443-59. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , Issue.2004 , pp. 443-59
    • Boneh, D.1    Boyen, X.2
  • 10
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Advances in Cryptology EUROCRYPT 2004. Springer-Verlag
    • Dan Boneh and Xavier Boyen. Short signatures without random oracles. In Advances in Cryptology EUROCRYPT 2004, volume 3027 of LNCS, pages 56-73. Springer-Verlag, 2004.
    • LNCS , vol.3027 , Issue.2004 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 11
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology EUROCRYPT 2005. Springer-Verlag
    • Dan Boneh, Xavier Boyen, and Eu-Jin Goh. Hierarchical identity based encryption with constant size ciphertext. In Advances in Cryptology EUROCRYPT 2005, volume 3494 of LNCS. Springer-Verlag, 2005.
    • LNCS , vol.3494 , pp. 2005
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 12
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • Advances in Cryptology CRYPTO 2004. Springer
    • Dan Boneh, Xavier Boyen, and Hovav Shacham. Short group signatures. In Advances in Cryptology CRYPTO 2004, volume 3152 of LNCS, pages 41-55. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 13
    • 51849118137 scopus 로고    scopus 로고
    • Circular-secure encryption from decision diffe-hellman
    • Dan Boneh, Shai Halevi, Michael Hamburg, and Rafail Ostrovsky. Circular-secure encryption from decision diffe-hellman. In CRYPTO'08, pages 108-125, 2008.
    • (2008) CRYPTO'08 , pp. 108-125
    • Boneh, D.1    Halevi, S.2    Hamburg, M.3    Ostrovsky, R.4
  • 14
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Dan Boneh and James Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897-1905, 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 15
    • 38049112331 scopus 로고    scopus 로고
    • Simulatable VRFs with applications to multi-theorem NIZK
    • Melissa Chase and Anna Lysyanskaya. Simulatable VRFs with applications to multi-theorem NIZK. In CRYPTO'07, pages 303-322, 2007.
    • (2007) CRYPTO'07 , pp. 303-322
    • Chase, M.1    Lysyanskaya, A.2
  • 17
    • 84958742006 scopus 로고    scopus 로고
    • Efficient construction of (distributed) verifiable random functions
    • Yevgeniy Dodis. Efficient construction of (distributed) verifiable random functions. In Public Key Cryptography, pages 1-17, 2003.
    • (2003) Public Key Cryptography , pp. 1-17
    • Dodis, Y.1
  • 18
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Yevgeniy Dodis and Aleksandr Yampolskiy. A verifiable random function with short proofs and keys. In Public Key Cryptography, pages 416-431, 2005.
    • (2005) Public Key Cryptography , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 19
    • 24144488603 scopus 로고    scopus 로고
    • Keyword search and oblivious pseudorandom functions
    • Michael Freedman, Yuval Ishai, Benny Pinkas, and Omer Reingold. Keyword search and oblivious pseudorandom functions. In TCC, pages 303-324, 2005.
    • (2005) TCC , pp. 303-324
    • Freedman, M.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 20
    • 0022793132 scopus 로고
    • How to construct random functions
    • Oded Goldreich, Shaff Goldwasser, and Silvio Micali. How to construct random functions. J. ACM, 34(4):792-807, 1986.
    • (1986) J. ACM , vol.34 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 21
    • 38049165151 scopus 로고    scopus 로고
    • Secure hybrid encryption from weakened key encapsulation
    • Dennis Hofheinz and Eike Kiltz. Secure hybrid encryption from weakened key encapsulation. In CRYPTO'07, pages 553-571, 2007.
    • (2007) CRYPTO'07 , pp. 553-571
    • Hofheinz, D.1    Kiltz, E.2
  • 22
    • 78650015962 scopus 로고    scopus 로고
    • Constructing verifiable random functions with large input spaces
    • Susan Hohenberger and Brent Waters. Constructing verifiable random functions with large input spaces. In Eurocrypto 2010, 2010.
    • (2010) Eurocrypto 2010
    • Hohenberger, S.1    Waters, B.2
  • 23
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
    • Stanislaw Jarecki and Xiaomin Liu. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In TCC'09, pages 577-594, 2009.
    • (2009) TCC'09 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 24
    • 74049161603 scopus 로고    scopus 로고
    • Efficient pseudorandom functions from the decisional linear assumption and weaker variants
    • Allison Lewko and Brent Waters. Efficient pseudorandom functions from the decisional linear assumption and weaker variants. In ACM CCS, pages 112-120, 2009.
    • (2009) ACM CCS , pp. 112-120
    • Lewko, A.1    Waters, B.2
  • 25
    • 84937425161 scopus 로고    scopus 로고
    • Unique signatures and verifiable random functions from the DH-DDH separation
    • LNCS. Springer-Verlag
    • Anna Lysyanskaya. Unique signatures and verifiable random functions from the DH-DDH separation. In Advances in Cryptology CRYPTO 2002, LNCS. Springer-Verlag, 2002.
    • (2002) Advances in Cryptology CRYPTO 2002
    • Lysyanskaya, A.1
  • 26
    • 0033346854 scopus 로고    scopus 로고
    • Verifiable random functions
    • Silvio Micali, Michael O. Rabin, and Salil P. Vadhan. Verifiable random functions. In FOCS, pages 120-130, 1999.
    • (1999) FOCS , pp. 120-130
    • Micali, S.1    Rabin, M.O.2    Vadhan, S.P.3
  • 27
    • 22144445920 scopus 로고    scopus 로고
    • The weil pairing, and its efficient calculation
    • Victor Miller. The Weil pairing, and its efficient calculation. Journal of Cryptology, 17(4), 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.4
    • Miller, V.1
  • 28
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • Moni Naor and Omer Reingold. Number-theoretic constructions of efficient pseudo-random functions. In FOCS'97, pages 458-67, 1997.
    • (1997) FOCS'97 , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 29
    • 38049124394 scopus 로고    scopus 로고
    • A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants
    • Report 2007/074
    • H. Shacham. A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074, 2007. http://eprint.iacr.org/.
    • (2007) Cryptology EPrint Archive
    • Shacham, H.1
  • 30
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Advances in Cryptology EUROCRYPT 2005. Springer-Verlag
    • Brent Waters. Efficient identity-based encryption without random oracles. In Advances in Cryptology EUROCRYPT 2005, volume 3494 of LNCS. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3494
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.