A Novel Construction of Constrained Verifiable Random Functions
Constrained verifiable random functions (VRFs) were introduced by Fuchsbauer. In a constrained VRF, one can drive a constrained key skS from the master secret key sk, where S is a subset of the domain. Using the constrained key skS, one can compute function values at points which are not in the set...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2019/4187892 |
id |
doaj-9b05a6e7ec384926869ee99e83edf028 |
---|---|
record_format |
Article |
spelling |
doaj-9b05a6e7ec384926869ee99e83edf0282020-11-25T01:26:53ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222019-01-01201910.1155/2019/41878924187892A Novel Construction of Constrained Verifiable Random FunctionsMuhua Liu0Ping Zhang1Qingtao Wu2Control Science and Engineering Postdoctoral Mobile Station, Henan University of Science and Technology, Luoyang 471023, ChinaControl Science and Engineering Postdoctoral Mobile Station, Henan University of Science and Technology, Luoyang 471023, ChinaControl Science and Engineering Postdoctoral Mobile Station, Henan University of Science and Technology, Luoyang 471023, ChinaConstrained verifiable random functions (VRFs) were introduced by Fuchsbauer. In a constrained VRF, one can drive a constrained key skS from the master secret key sk, where S is a subset of the domain. Using the constrained key skS, one can compute function values at points which are not in the set S. The security of constrained VRFs requires that the VRFs’ output should be indistinguishable from a random value in the range. They showed how to construct constrained VRFs for the bit-fixing class and the circuit constrained class based on multilinear maps. Their construction can only achieve selective security where an attacker must declare which point he will attack at the beginning of experiment. In this work, we propose a novel construction for constrained verifiable random function from bilinear maps and prove that it satisfies a new security definition which is stronger than the selective security. We call it semiadaptive security where the attacker is allowed to make the evaluation queries before it outputs the challenge point. It can immediately get that if a scheme satisfied semiadaptive security, and it must satisfy selective security.http://dx.doi.org/10.1155/2019/4187892 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Muhua Liu Ping Zhang Qingtao Wu |
spellingShingle |
Muhua Liu Ping Zhang Qingtao Wu A Novel Construction of Constrained Verifiable Random Functions Security and Communication Networks |
author_facet |
Muhua Liu Ping Zhang Qingtao Wu |
author_sort |
Muhua Liu |
title |
A Novel Construction of Constrained Verifiable Random Functions |
title_short |
A Novel Construction of Constrained Verifiable Random Functions |
title_full |
A Novel Construction of Constrained Verifiable Random Functions |
title_fullStr |
A Novel Construction of Constrained Verifiable Random Functions |
title_full_unstemmed |
A Novel Construction of Constrained Verifiable Random Functions |
title_sort |
novel construction of constrained verifiable random functions |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2019-01-01 |
description |
Constrained verifiable random functions (VRFs) were introduced by Fuchsbauer. In a constrained VRF, one can drive a constrained key skS from the master secret key sk, where S is a subset of the domain. Using the constrained key skS, one can compute function values at points which are not in the set S. The security of constrained VRFs requires that the VRFs’ output should be indistinguishable from a random value in the range. They showed how to construct constrained VRFs for the bit-fixing class and the circuit constrained class based on multilinear maps. Their construction can only achieve selective security where an attacker must declare which point he will attack at the beginning of experiment. In this work, we propose a novel construction for constrained verifiable random function from bilinear maps and prove that it satisfies a new security definition which is stronger than the selective security. We call it semiadaptive security where the attacker is allowed to make the evaluation queries before it outputs the challenge point. It can immediately get that if a scheme satisfied semiadaptive security, and it must satisfy selective security. |
url |
http://dx.doi.org/10.1155/2019/4187892 |
work_keys_str_mv |
AT muhualiu anovelconstructionofconstrainedverifiablerandomfunctions AT pingzhang anovelconstructionofconstrainedverifiablerandomfunctions AT qingtaowu anovelconstructionofconstrainedverifiablerandomfunctions AT muhualiu novelconstructionofconstrainedverifiablerandomfunctions AT pingzhang novelconstructionofconstrainedverifiablerandomfunctions AT qingtaowu novelconstructionofconstrainedverifiablerandomfunctions |
_version_ |
1725108317262446592 |