Private Puncturable PRFs from Standard Lattice Assumptions

被引:37
作者
Boneh, Dan [1 ]
Kim, Sam [1 ]
Montgomery, Hart [2 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Fujitsu Labs Amer, Sunnyvale, CA USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I | 2017年 / 10210卷
基金
美国国家科学基金会;
关键词
PREDICATE ENCRYPTION; IDENTITY;
D O I
10.1007/978-3-319-56620-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A puncturable pseudorandom function (PRF) has a master key k that enables one to evaluate the PRF at all points of the domain, and has a punctured key k(x) that enables one to evaluate the PRF at all points but one. The punctured key kx reveals no information about the value of the PRF at the punctured point x. Punctured PRFs play an important role in cryptography, especially in applications of indistinguishability obfuscation. However, in previous constructions, the punctured key k(x) completely reveals the punctured point x: given k(x) it is easy to determine x. A private puncturable PRF is one where k(x) reveals nothing about x. This concept was defined by Boneh, Lewi, and Wu, who showed the usefulness of private puncturing, and gave constructions based on multilinear maps. The question is whether private puncturing can be built from a standard (weaker) cryptographic assumption. We construct the first privately puncturable PRF from standard lattice assumptions, namely learning with errors (LWE) and 1 dimensional short integer solutions (1D-SIS), which have connections to worst-case hardness of general lattice problems. Our starting point is the (non-private) PRF of Brakerski and Vaikuntanathan. We introduce a number of new techniques to enhance this PRF, from which we obtain a privately puncturable PRF. In addition, we also study the simulation based definition of private constrained PRFs for general circuits, and show that the definition is not satisfiable.
引用
收藏
页码:415 / 445
页数:31
相关论文
共 62 条
  • [1] Constrained PRFs for Unbounded Inputs
    Abusalah, Hamza
    Fuchsbauer, Georg
    Pietrzak, Krzysztof
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 413 - 428
  • [2] Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
  • [3] Agrawal S, 2013, LECT NOTES COMPUT SC, V8043, P500, DOI 10.1007/978-3-642-40084-1_28
  • [4] Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
  • [5] Ajtai M, 1996, STOC
  • [6] Alperin-Sheriff J, 2014, LECT NOTES COMPUT SC, V8616, P297, DOI 10.1007/978-3-662-44371-2_17
  • [7] [Anonymous], 2014, STOC
  • [8] [Anonymous], 2009, STOC
  • [9] [Anonymous], 2010, 2010556 CRYPT EPRINT
  • [10] [Anonymous], 2012, ITCS 2012