Paper 2014/074
New and Improved Key-Homomorphic Pseudorandom Functions
Abhishek Banerjee and Chris Peikert
Abstract
A \emph{key-homomorphic} pseudorandom function (PRF) family
allows one to efficiently compute the
value given and . Such functions
have many applications, such as distributing the operation of a
key-distribution center and updatable symmetric encryption. The only
known construction of key-homomorphic PRFs without random oracles, due
to Boneh \etal (CRYPTO~2013), is based on the learning with errors
(\lwe) problem and hence on worst-case lattice problems. However, the
security proof relies on a very strong \lwe assumption (i.e., very
large approximation factors), and hence has quite inefficient
parameter sizes and runtimes.
In this work we give new constructions of key-homomorphic PRFs that
are based on much weaker \lwe assumptions, are much more efficient in
time and space, and are still highly parallel. More specifically, we
improve the \lwe approximation factor from exponential in the input
length to exponential in its \emph{logarithm} (or less). For input
length~
Note: Small updates corresponding to Crypto'14 final submission.
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- A major revision of an IACR publication in CRYPTO 2014
- Keywords
- pseudorandom functionskey homomorphismlearning with errorslattices
- Contact author(s)
- cpeikert @ cc gatech edu
- History
- 2014-06-14: last of 2 revisions
- 2014-02-04: received
- See all versions
- Short URL
- https://ia.cr/2014/074
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/074, author = {Abhishek Banerjee and Chris Peikert}, title = {New and Improved Key-Homomorphic Pseudorandom Functions}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/074}, year = {2014}, url = {https://eprint.iacr.org/2014/074} }