Cryptology ePrint Archive: Report 2018/1231

Post-quantum verifiable random functions from ring signatures

Endre Abraham

Abstract: One of the greatest challenges on exchanging seemingly random nonces or data either on a trusted or untrusted channel is the hardness of verify- ing the correctness of such output. If one of the parties or an eavesdropper can gain game-theoretic advantage of manipulating this seed, others can- not efficiently notice modifications nor accuse the oracle in some way. Decentralized applications where an oracle can go unnoticed with biased outputs are highly vulnerable to attacks of this kind, limiting applicability of these parties even though they can introduce great scalability to such systems. Verifiable random functions[1] presented by Micali can be viewed as keyed hash funcions where the key(s) used are asymmetric. They al- low the oracle to prove correctness of a defined pseudorandom function on seed s without actually making it public, thus not compromising the unpredictability of the function. Our contribution here is to provide a variant of this scheme and proving itís security against known quantum attacks and quantum oracles

Category / Keywords:

Date: received 22 Dec 2018

Contact author: abrahamendre9 at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20181230:125917 (All versions of this report)

Short URL: ia.cr/2018/1231


[ Cryptology ePrint archive ]