We show how to build puncturable PRFs with adaptive security proofs in the standard model that involve only polynomial loss to the underlying assumptions. Prior work had either super-polynomial loss or applied the random oracle heuristic. Our construction uses indistinguishability obfuscation and DDH-hard algebraic groups of composite order.
Category / Keywords: foundations/puncturable pseudorandom functions, adaptive security Original Publication (with minor differences): IACR-ASIACRYPT-2015 Date: received 3 Jul 2014, last revised 6 Sep 2015 Contact author: kvenkata at cs utexas edu Available format(s): PDF | BibTeX Citation Note: Fixed some typos, and added note about admissible hash functions Version: 20150906:215905 (All versions of this report) Short URL: ia.cr/2014/521 Discussion forum: Show discussion | Start new discussion