Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques
S Yamada - Advances in Cryptology–CRYPTO 2017: 37th Annual …, 2017 - Springer
In this paper, we focus on the constructions of adaptively secure identity-based encryption
(IBE) from lattices and verifiable random function (VRF) with large input spaces. Existing …
(IBE) from lattices and verifiable random function (VRF) with large input spaces. Existing …
A generic approach to constructing and proving verifiable random functions
R Goyal, S Hohenberger, V Koppula… - Theory of Cryptography …, 2017 - Springer
Abstract Verifiable Random Functions (VRFs) as introduced by Micali, Rabin and Vadhan
are a special form of Pseudo Random Functions (PRFs) wherein a secret key holder can …
are a special form of Pseudo Random Functions (PRFs) wherein a secret key holder can …
Verifiable random functions from non-interactive witness-indistinguishable proofs
N Bitansky - Journal of Cryptology, 2020 - Springer
Verifiable random functions (VRFs) are pseudorandom functions where the owner of the
seed, in addition to computing the function's value y at any point x, can also generate a non …
seed, in addition to computing the function's value y at any point x, can also generate a non …
Registered FE beyond predicates:(attribute-based) linear functions and more
This paper introduces the first registered functional encryption RFE scheme tailored for
linear functions. Distinctly different from classical functional encryption (FE), RFE addresses …
linear functions. Distinctly different from classical functional encryption (FE), RFE addresses …
Did-based distributed verifiable random function with successor rule-based de bruijn sequence in blockchain
This paper focuses on addressing the prevalent issues related to established Verifiable
Random Function (VRF) schemes and presents our novel VRF scheme. Our proposed …
Random Function (VRF) schemes and presents our novel VRF scheme. Our proposed …
From FE combiners to secure MPC and back
Cryptographic combiners allow one to combine many candidates for a cryptographic
primitive, possibly based on different computational assumptions, into another candidate …
primitive, possibly based on different computational assumptions, into another candidate …
Hunting and gathering–verifiable random functions from standard assumptions with short proofs
L Kohl - IACR International Workshop on Public Key …, 2019 - Springer
A verifiable random function (VRF) is a pseudorandom function, where outputs can be
publicly verified. That is, given an output value together with a proof, one can check that the …
publicly verified. That is, given an output value together with a proof, one can check that the …
Smart contract-based secure verifiable random function using chacha20 sequence in blockchain
We provide a novel smart contract-based Verifiable Random Function (VRF) scheme that
addresses the challenges associated with existing frameworks. Our suggested distributed …
addresses the challenges associated with existing frameworks. Our suggested distributed …
On the untapped potential of encoding predicates by arithmetic circuits and their applications
S Katsumata - International Conference on the Theory and …, 2017 - Springer
Predicates are used in cryptography as a fundamental tool to control the disclosure of
secrets. However, how to embed a particular predicate into a cryptographic primitive is …
secrets. However, how to embed a particular predicate into a cryptographic primitive is …
Combiners for functional encryption, unconditionally
Functional encryption (FE) combiners allow one to combine many candidates for a
functional encryption scheme, possibly based on different computational assumptions, into …
functional encryption scheme, possibly based on different computational assumptions, into …