2005
DOI: 10.1007/978-3-540-30580-4_28
|View full text |Cite
|
Sign up to set email alerts
|

A Verifiable Random Function with Short Proofs and Keys

Abstract: Abstract. We give a simple and efficient construction of a verifiable random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [14,15], it avoids using an inefficient Goldreich-Levin transformation, thereby saving several factors in security. Our proofs of security are based on a decisional bilinear Diffie-Hellman inversion assumption, which seems reasonable given current state of knowledge. For small message spaces, our VRF's proofs and keys have constant si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
277
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 313 publications
(279 citation statements)
references
References 21 publications
2
277
0
Order By: Relevance
“…Occasionally we drop the t and and refer to the (decision) -BDHE in G. We note that the -BDHE assumption is a natural extension of the bilinear-DHI assumption previously used in [BB04,DY05]. Furthermore, Boneh et al [BBG05] show that the -BDHE assumption holds in generic bilinear groups [Sho97].…”
Section: Definition 3 We Say That the (Decision) (T )-Bdhe Assumpmentioning
confidence: 97%
“…Occasionally we drop the t and and refer to the (decision) -BDHE in G. We note that the -BDHE assumption is a natural extension of the bilinear-DHI assumption previously used in [BB04,DY05]. Furthermore, Boneh et al [BBG05] show that the -BDHE assumption holds in generic bilinear groups [Sho97].…”
Section: Definition 3 We Say That the (Decision) (T )-Bdhe Assumpmentioning
confidence: 97%
“…Unfortunately, both of these works rely on interactive complexity assumptions (for large input spaces.) Dodis and Yampolskiy [14] gave a very efficient VRF under a non-interactive assumption by applying the deterministic version of Boneh-Boyen [6] signatures. In a bilinear group G of prime order p, its seed is a single element of Z p and its proof is a single element of G. Its main drawback is that its security only holds for small input spaces.…”
Section: Related Workmentioning
confidence: 99%
“…For the reasons above, existing VRF systems employ a different strategy when proving the security of VRFs. Almost all proofs of VRF constructions (that do not rely on interactive assumptions) [25,14,1] use a type of "all but one" technique for proving pseudorandoness. In these proofs a reduction algorithm will first guess the attacker's challenge input as some random string w in {0, 1} n , where n is the bit length of inputs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The main advantage of our construction is that it allows the client to insert and delete values, as well as update the value at any cell by sending a single group element to the server after retrieving the current value stored in the cell. Prior solutions either rely on non-constant size assumptions (such as variants of the Strong Diffie-Hellman assumption [23,15]), require expensive generation of primes for each operation (in the worst case), or require expensive "re-shuffling" procedures to be performed once in a while on the data. On the other hand, our construction works in the private key setting, whereas some prior solutions allow public verification (e.g., [16,49]).…”
Section: Introductionmentioning
confidence: 99%