2013
DOI: 10.1007/s00145-013-9169-2
|View full text |Cite
|
Sign up to set email alerts
|

From Non-adaptive to Adaptive Pseudorandom Functions

Abstract: Unlike the standard notion of pseudorandom functions (PRF), a non-adaptive PRF is only required to be indistinguishable from a random function in the eyes of a non-adaptive distinguisher (i.e., one that prepares its oracle calls in advance). A recent line of research has studied the possibility of a direct construction of adaptive PRFs from non-adaptive ones, where direct means that the constructed adaptive PRF uses only few (ideally, constant number of) calls to the underlying non-adaptive PRF. Unfortunately,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…We use this paradigm to present a new PRF domain extension method that requires just two calls to the original PRF, can withstand as many queries as the original domain size, and has a distinguishing probability that is exponentially small in the amount of non-cryptographic work. We also obtain a security-preserving reduction from non-adaptive to adaptive PRFs, an improvement upon the recent result of Berman and Haitner [7].…”
Section: Introductionmentioning
confidence: 52%
See 4 more Smart Citations
“…We use this paradigm to present a new PRF domain extension method that requires just two calls to the original PRF, can withstand as many queries as the original domain size, and has a distinguishing probability that is exponentially small in the amount of non-cryptographic work. We also obtain a security-preserving reduction from non-adaptive to adaptive PRFs, an improvement upon the recent result of Berman and Haitner [7].…”
Section: Introductionmentioning
confidence: 52%
“…On the other hand, almost k-wise independent families 6 are only granted to be resistant against non-adaptive distinguishers. 7 Yet, the result presented in Section 3 yields that, in some cases, the adaptive security of the latter families follows from their non-adaptive security.…”
Section: Many-wise Independent Hashingmentioning
confidence: 95%
See 3 more Smart Citations