Verifiable random function

Verifiable random function

In cryptography, the concept of a verifiable random function was introduced by Micali, Rabin, and Vadhan. [cite conference | first = Silvio | last = Micali | coauthors = Rabin, Michael O.; Vadhan, Salil P. | title = Verifiable random functions | booktitle = Proceedings of the 40th IEEE Symposium on Foundations of Computer Science | pages = 120–130 | date = 1999 ] It is a pseudo-random function that provides publicly verifiable proofs of its outputs' correctness. Given an input value "x", the owner of the secret key SK can compute the function value "y" = "F"SK("x") and the proof "p"SK("x"). Using the proof and the public key, everyone can check that the value "y" = "F"SK("x") was indeed computed correctly, yet this information cannot be used to find the secret key.

The original construction was rather inefficient. Recently, an efficient and practical verifiable random function was proposed by Yevgeniy Dodis and Aleksandr Yampolskiy. In their construction,: F_{SK}(x) = e(g, g)^{1/(x+SK)} quadmbox{and}quad p_{SK}(x) = g^{1/(x+SK)}, where "e"(·,·) is a bilinear map.To verify whether F_{SK}(x) was computed correctly or not, one can checkif e(g^x PK, p{SK}(x))=e(g,g).

The proof of security relies on a new decisional bilinear Diffie-Hellman inversion assumption, which asks given (g, g^{x}, ldots, g^{(x^q)}, R) as input to distinguish R=e(g,g)^{1/x} from random.

References


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Verifiable secret sharing — In cryptography, a secret sharing scheme is verifiable if auxiliary information is included that allows players to verify their shares as consistent. More formally, verifiable secret sharing ensures that even if the dealer is malicious there is a …   Wikipedia

  • Publicly Verifiable Secret Sharing — In cryptography, a secret sharing scheme is publicly verifiable (PVSS) if it is a verifiable secret sharing scheme and if any party involved can verify the validity of the shares distributed by the dealer.quotation In verifiable secret sharing… …   Wikipedia

  • List of mathematics articles (V) — NOTOC Vac Vacuous truth Vague topology Valence of average numbers Valentin Vornicu Validity (statistics) Valuation (algebra) Valuation (logic) Valuation (mathematics) Valuation (measure theory) Valuation of options Valuation ring Valuative… …   Wikipedia

  • Commitment scheme — In cryptography, a commitment scheme allows one to commit to a value while keeping it hidden, with the ability to reveal the committed value later. Commitments are used to bind a party to a value so that they cannot adapt to other messages in… …   Wikipedia

  • quantum mechanics — quantum mechanical, adj. Physics. a theory of the mechanics of atoms, molecules, and other physical systems that are subject to the uncertainty principle. Abbr.: QM Cf. nonrelativistic quantum mechanics, relativistic quantum mechanics. [1920 25]… …   Universalium

  • Metaphysics — This article is about the branch of philosophy dealing with theories of existence and knowledge. For the work of Aristotle, see Metaphysics (Aristotle). For the occult field, see Metaphysics (supernatural). Philosophy …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… …   Wikipedia

  • Character mask — Part of a series on Marxism …   Wikipedia

  • Intelligent design — This article is about intelligent design as promulgated by the Discovery Institute. For other uses, see Intelligent design (disambiguation). For the philosophical argument from design , see Teleological argument …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”