Show simple item record

dc.contributor.authorBoyle, Elette
dc.contributor.authorGoldwasser, Shafi
dc.contributor.authorIvan, Ioana Elisabeta
dc.date.accessioned2014-05-15T18:30:32Z
dc.date.available2014-05-15T18:30:32Z
dc.date.issued2014
dc.identifier.isbn978-3-642-54630-3
dc.identifier.isbn978-3-642-54631-0
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/87009
dc.description.abstractWe introduce two new cryptographic primitives: functional digital signatures and functional pseudorandom functions. In a functional signature scheme, in addition to a master signing key that can be used to sign any message, there are signing keys for a function f, which allow one to sign any message in the range of f. As a special case, this implies the ability to generate keys for predicates P, which allow one to sign any message m for which P(m) = 1. We show applications of functional signatures to constructing succinct non-interactive arguments and delegation schemes. We give several general constructions for this primitive based on different computational hardness assumptions, and describe the trade-offs between them in terms of the assumptions they require and the size of the signatures. In a functional pseudorandom function, in addition to a master secret key that can be used to evaluate the pseudorandom function F on any point in the domain, there are additional secret keys for a function f, which allow one to evaluate F on any y for which there exists an x such that f(x) = y. As a special case, this implies pseudorandom functions with selective access, where one can delegate the ability to evaluate the pseudorandom function on inputs y for which a predicate P(y) = 1 holds. We define and provide a sample construction of a functional pseudorandom function family for prefix-fixing functions. This construction yields, in particular, punctured pseudorandom functions, which have proven an invaluable tool in recent advances in obfuscation (Sahai and Waters ePrint 2013).en_US
dc.description.sponsorshipUnited States. Air Force Research Laboratory (agreement number FA8750-11-2-0225)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Trustworthy Computing Program: NSF CCF-1018064)en_US
dc.description.sponsorshipEuropean Union (Tenth Framework Programme (FP10/ 2010-2016), grant agreement no. 259426 ERC-CaC)en_US
dc.language.isoen_US
dc.publisherSpringer-Verlag Berlin Heidelbergen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-642-54631-0_29en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceOther repositoryen_US
dc.titleFunctional Signatures and Pseudorandom Functionsen_US
dc.typeArticleen_US
dc.identifier.citationBoyle, Elette, Shafi Goldwasser, and Ioana Ivan. “Functional Signatures and Pseudorandom Functions.” in Public-Key Cryptography – PKC 2014, edited by Hugo Krawczyk. Springer: Berlin, 2014. (Lecture Notes in Computer Science; volume 8383) (2014): 501–519.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorGoldwasser, Shafien_US
dc.relation.journalPublic-Key Cryptography – PKC 2014en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsBoyle, Elette; Goldwasser, Shafi; Ivan, Ioanaen_US
dc.identifier.orcidhttps://orcid.org/0000-0003-4728-1535
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record