Verifiable random functions from weaker assumptions
From MaRDI portal
Publication:5261672
Recommendations
Cited in
(34)- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- Subversion-resilient signatures: definitions, constructions and applications
- The price of verifiability: lower bounds for verifiable random functions
- Weak Verifiable Random Functions
- Verifiable Random Functions from Identity-Based Key Encapsulation
- Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
- Efficient Construction of (Distributed) Verifiable Random Functions
- On the security loss of unique signatures
- Adaptively secure distributed PRFs from LWE
- A generic approach to constructing and proving verifiable random functions
- Verifiable random functions from non-interactive witness-indistinguishable proofs
- Verifiable random functions from non-interactive witness-indistinguishable proofs
- Practical post-quantum few-time verifiable random function with applications to Algorand
- Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
- Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions
- scientific article; zbMATH DE number 1942446 (Why is no real title available?)
- Classical and quantum security of elliptic curve VRF, via relative indifferentiability
- One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model
- Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques
- Verifiable random functions from standard assumptions
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Identity-based encryption from LWE with more compact master public key
- On the real-world instantiability of admissible hash functions and efficient verifiable random functions
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- Verifiable random functions with optimal tightness
- Adaptively secure constrained pseudorandom functions in the standard model
- Constructing verifiable random functions with large input spaces
- Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations
- Hunting and gathering -- verifiable random functions from standard assumptions with short proofs
- Multi-client inner product encryption: function-hiding instantiations without random oracles
- Indistinguishability obfuscation: from approximate to exact
- Simulatable verifiable random function from the LWE assumption
- Practical verifiable random function with RKA security
This page was built for publication: Verifiable random functions from weaker assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261672)