Private Constrained PRFs (and More) from LWE
© 2017, International Association for Cryptologic Research. In a constrained PRF, the owner of the PRF key K can generate constrained keys K_f that allow anyone to evaluate the PRF on inputs x that satisfy the predicate f (namely, where f(x) is "true") but reveal no information about the P...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Springer International Publishing,
2021-11-09T13:41:27Z.
|
Subjects: | |
Online Access: | Get fulltext |