Constrained Verifiable Random Functions Conference Paper


Author(s): Fuchsbauer, Georg
Title: Constrained Verifiable Random Functions
Title Series: LNCS
Affiliation IST Austria
Abstract: We extend the notion of verifiable random functions (VRF) to constrained VRFs, which generalize the concept of constrained pseudorandom functions, put forward by Boneh and Waters (Asiacrypt’13), and independently by Kiayias et al. (CCS’13) and Boyle et al. (PKC’14), who call them delegatable PRFs and functional PRFs, respectively. In a standard VRF the secret key sk allows one to evaluate a pseudorandom function at any point of its domain; in addition, it enables computation of a non-interactive proof that the function value was computed correctly. In a constrained VRF from the key sk one can derive constrained keys skS for subsets S of the domain, which allow computation of function values and proofs only at points in S. After formally defining constrained VRFs, we derive instantiations from the multilinear-maps-based constrained PRFs by Boneh and Waters, yielding a VRF with constrained keys for any set that can be decided by a polynomial-size circuit. Our VRFs have the same function values as the Boneh-Waters PRFs and are proved secure under the same hardness assumption, showing that verifiability comes at no cost. Constrained (functional) VRFs were stated as an open problem by Boyle et al.
Keywords: Secret key; Pseudo-random functions; Cryptography; Multilinear maps; Function values; Non-interactive proof; Polynomial size; Verifiability; Verifiable random function; Aluminum
Conference Title: SCN: Security and Cryptography for Networks
Volume: 8642
Conference Dates: September 3 - 5, 2014
Conference Location: Amalfi, Italy
Publisher: Springer  
Date Published: 2014-01-01
Start Page: 95
End Page: 114
Sponsor: Supported by the European Research Council, ERC Sta rting Grant (259668-PSPC).
URL:
DOI: 10.1007/978-3-319-10879-7_7
Open access: yes (repository)
IST Austria Authors
Related IST Austria Work