Verifiable random function
- Verifiable random function
In cryptography, the concept of a verifiable random function was introduced by Micali, Rabin, and Vadhan. [cite conference | first = Silvio | last = Micali | coauthors = Rabin, Michael O.; Vadhan, Salil P. | title = Verifiable random functions | booktitle = Proceedings of the 40th IEEE Symposium on Foundations of Computer Science | pages = 120–130 | date = 1999 ] It is a pseudo-random function that provides publicly verifiable proofs of its outputs' correctness. Given an input value "x", the owner of the secret key SK can compute the function value "y" = "F"SK("x") and the proof "p"SK("x"). Using the proof and the public key, everyone can check that the value "y" = "F"SK("x") was indeed computed correctly, yet this information cannot be used to find the secret key.
The original construction was rather inefficient. Recently, an efficient and practical verifiable random function was proposed by Yevgeniy Dodis and Aleksandr Yampolskiy. In their construction,: where "e"(·,·) is a bilinear map.To verify whether was computed correctly or not, one can checkif .
The proof of security relies on a new decisional bilinear Diffie-Hellman inversion assumption, which asks given as input to distinguish from random.
References
Wikimedia Foundation.
2010.
Look at other dictionaries:
Verifiable secret sharing — In cryptography, a secret sharing scheme is verifiable if auxiliary information is included that allows players to verify their shares as consistent. More formally, verifiable secret sharing ensures that even if the dealer is malicious there is a … Wikipedia
Publicly Verifiable Secret Sharing — In cryptography, a secret sharing scheme is publicly verifiable (PVSS) if it is a verifiable secret sharing scheme and if any party involved can verify the validity of the shares distributed by the dealer.quotation In verifiable secret sharing… … Wikipedia
List of mathematics articles (V) — NOTOC Vac Vacuous truth Vague topology Valence of average numbers Valentin Vornicu Validity (statistics) Valuation (algebra) Valuation (logic) Valuation (mathematics) Valuation (measure theory) Valuation of options Valuation ring Valuative… … Wikipedia
Commitment scheme — In cryptography, a commitment scheme allows one to commit to a value while keeping it hidden, with the ability to reveal the committed value later. Commitments are used to bind a party to a value so that they cannot adapt to other messages in… … Wikipedia
quantum mechanics — quantum mechanical, adj. Physics. a theory of the mechanics of atoms, molecules, and other physical systems that are subject to the uncertainty principle. Abbr.: QM Cf. nonrelativistic quantum mechanics, relativistic quantum mechanics. [1920 25]… … Universalium
Metaphysics — This article is about the branch of philosophy dealing with theories of existence and knowledge. For the work of Aristotle, see Metaphysics (Aristotle). For the occult field, see Metaphysics (supernatural). Philosophy … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… … Wikipedia
Character mask — Part of a series on Marxism … Wikipedia
Intelligent design — This article is about intelligent design as promulgated by the Discovery Institute. For other uses, see Intelligent design (disambiguation). For the philosophical argument from design , see Teleological argument … Wikipedia