Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs

被引:1
|
作者
Nir Bitansky
机构
[1] Tel Aviv University,
来源
Journal of Cryptology | 2020年 / 33卷
关键词
Foundations; Verifiable random functions; Non-interactive witness indistinguishable proofs;
D O I
暂无
中图分类号
学科分类号
摘要
Verifiable random functions (VRFs) are pseudorandom functions where the owner of the seed, in addition to computing the function’s value y at any point x, can also generate a non-interactive proof π\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\pi $$\end{document} that y is correct, without compromising pseudorandomness at other points. Being a natural primitive with a wide range of applications, considerable efforts have been directed toward the construction of such VRFs. While these efforts have resulted in a variety of algebraic constructions (from bilinear maps or the RSA problem), the relation between VRFs and other general primitives is still not well understood. We present new constructions of VRFs from general primitives, the main one being non-interactive witness-indistinguishable proofs (NIWIs). This includes: (1) a selectively secure VRF assuming NIWIs and non-interactive commitments. As usual, the VRF can be made adaptively secure assuming subexponential hardness of the underlying primitives. (2) An adaptively secure VRF assuming (polynomially hard) NIWIs, non-interactive commitments, and (single-key) constrained pseudorandom functions for a restricted class of constraints. The above primitives can be instantiated under various standard assumptions, which yields corresponding VRF instantiations, under different assumptions than were known so far. One notable example is a non-uniform construction of VRFs from subexponentially hard trapdoor permutations, or more generally, from verifiable pseudorandom generators (the construction can be made uniform under a standard derandomization assumption). This partially answers an open question by Dwork and Naor (FOCS ’00). The construction and its analysis are quite simple. Both draw from ideas commonly used in the context of indistinguishability obfuscation.
引用
收藏
页码:459 / 493
页数:34
相关论文
共 50 条
  • [41] Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy
    Luo, Zhilong
    Sun, Shi-Feng
    Wang, Zhedong
    Gu, Dawu
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 281 - 302
  • [42] On Non-Interactive Simulation of Binary Random Variables
    Yu, Lei
    Tan, Vincent Y. F.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (04) : 2528 - 2538
  • [43] Paillier-based publicly verifiable (non-interactive) secret sharing
    Jhanwar, Mahabir Prasad
    Venkateswarlu, Ayineedi
    Safavi-Naini, Reihaneh
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (02) : 529 - 546
  • [44] Non-interactive Blind Signatures for Random Messages
    Hanzlik, Lucjan
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V, 2023, 14008 : 722 - 752
  • [45] Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
    Gentry, Craig
    Halevi, Shai
    Lyubashevsky, Vadim
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 458 - 487
  • [46] Paillier-based publicly verifiable (non-interactive) secret sharing
    Mahabir Prasad Jhanwar
    Ayineedi Venkateswarlu
    Reihaneh Safavi-Naini
    [J]. Designs, Codes and Cryptography, 2014, 73 : 529 - 546
  • [47] Experimenting With Non-Interactive Range Proofs Based on the Strong RSA Assumption
    Kim, Myungsun
    Lee, Hyung Tae
    [J]. IEEE ACCESS, 2019, 7 : 117505 - 117516
  • [48] A non-interactive deniable authentication scheme based on designated verifier proofs
    Wang, Bin
    Song, ZhaoXia
    [J]. INFORMATION SCIENCES, 2009, 179 (06) : 858 - 865
  • [49] Non-interactive Evaluation of Encrypted Elementary Functions
    Chen, Liang
    Gao, Chengmin
    Xu, Yong
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 45 - +
  • [50] Communication-efficient non-interactive proofs of knowledge with online extractors
    Fischlin, M
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 152 - 168