A Novel Construction of Constrained Verifiable Random Functions

Constrained verifiable random functions (VRFs) were introduced by Fuchsbauer. In a constrained VRF, one can drive a constrained key skS from the master secret key sk, where S is a subset of the domain. Using the constrained key skS, one can compute function values at points which are not in the set...

Full description

Bibliographic Details
Main Authors: Muhua Liu, Ping Zhang, Qingtao Wu
Format: Article
Language:English
Published: Hindawi-Wiley 2019-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2019/4187892
id doaj-9b05a6e7ec384926869ee99e83edf028
record_format Article
spelling doaj-9b05a6e7ec384926869ee99e83edf0282020-11-25T01:26:53ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222019-01-01201910.1155/2019/41878924187892A Novel Construction of Constrained Verifiable Random FunctionsMuhua Liu0Ping Zhang1Qingtao Wu2Control Science and Engineering Postdoctoral Mobile Station, Henan University of Science and Technology, Luoyang 471023, ChinaControl Science and Engineering Postdoctoral Mobile Station, Henan University of Science and Technology, Luoyang 471023, ChinaControl Science and Engineering Postdoctoral Mobile Station, Henan University of Science and Technology, Luoyang 471023, ChinaConstrained verifiable random functions (VRFs) were introduced by Fuchsbauer. In a constrained VRF, one can drive a constrained key skS from the master secret key sk, where S is a subset of the domain. Using the constrained key skS, one can compute function values at points which are not in the set S. The security of constrained VRFs requires that the VRFs’ output should be indistinguishable from a random value in the range. They showed how to construct constrained VRFs for the bit-fixing class and the circuit constrained class based on multilinear maps. Their construction can only achieve selective security where an attacker must declare which point he will attack at the beginning of experiment. In this work, we propose a novel construction for constrained verifiable random function from bilinear maps and prove that it satisfies a new security definition which is stronger than the selective security. We call it semiadaptive security where the attacker is allowed to make the evaluation queries before it outputs the challenge point. It can immediately get that if a scheme satisfied semiadaptive security, and it must satisfy selective security.http://dx.doi.org/10.1155/2019/4187892
collection DOAJ
language English
format Article
sources DOAJ
author Muhua Liu
Ping Zhang
Qingtao Wu
spellingShingle Muhua Liu
Ping Zhang
Qingtao Wu
A Novel Construction of Constrained Verifiable Random Functions
Security and Communication Networks
author_facet Muhua Liu
Ping Zhang
Qingtao Wu
author_sort Muhua Liu
title A Novel Construction of Constrained Verifiable Random Functions
title_short A Novel Construction of Constrained Verifiable Random Functions
title_full A Novel Construction of Constrained Verifiable Random Functions
title_fullStr A Novel Construction of Constrained Verifiable Random Functions
title_full_unstemmed A Novel Construction of Constrained Verifiable Random Functions
title_sort novel construction of constrained verifiable random functions
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2019-01-01
description Constrained verifiable random functions (VRFs) were introduced by Fuchsbauer. In a constrained VRF, one can drive a constrained key skS from the master secret key sk, where S is a subset of the domain. Using the constrained key skS, one can compute function values at points which are not in the set S. The security of constrained VRFs requires that the VRFs’ output should be indistinguishable from a random value in the range. They showed how to construct constrained VRFs for the bit-fixing class and the circuit constrained class based on multilinear maps. Their construction can only achieve selective security where an attacker must declare which point he will attack at the beginning of experiment. In this work, we propose a novel construction for constrained verifiable random function from bilinear maps and prove that it satisfies a new security definition which is stronger than the selective security. We call it semiadaptive security where the attacker is allowed to make the evaluation queries before it outputs the challenge point. It can immediately get that if a scheme satisfied semiadaptive security, and it must satisfy selective security.
url http://dx.doi.org/10.1155/2019/4187892
work_keys_str_mv AT muhualiu anovelconstructionofconstrainedverifiablerandomfunctions
AT pingzhang anovelconstructionofconstrainedverifiablerandomfunctions
AT qingtaowu anovelconstructionofconstrainedverifiablerandomfunctions
AT muhualiu novelconstructionofconstrainedverifiablerandomfunctions
AT pingzhang novelconstructionofconstrainedverifiablerandomfunctions
AT qingtaowu novelconstructionofconstrainedverifiablerandomfunctions
_version_ 1725108317262446592