Chrome Extension
WeChat Mini Program
Use on ChatGLM

Pseudorandom Functions From Lwe: Rka Security And Application

INFORMATION SECURITY AND PRIVACY, ACISP 2019(2019)

Cited 0|Views45
No score
Abstract
Pseudorandom Functions (PRF) is a basic primitive in cryptography. In this paper, we study related key attacks (RKA) with which the adversary is able to choose function phi and observe the behavior of the PRF under the modified secret key phi(k). We focus on the PRF from the Learning with Errors (LWE) assumption by Banerjee and Peikert in CRYPTO 2014. We prove that the PRF is secure against unique-input key shift attacks and restricted affine attacks. After that, we use this RKA-secure PRF to construct a robustly reusable fuzzy extractor, which enjoys higher efficiency and better error correction rate.
More
Translated text
Key words
PRF, Related key attacks, Robustly reusable fuzzy extractor
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined