Paper 2023/234

Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness

Rupeng Yang, University of Wollongong
Abstract

A private puncturable pseudorandom function (PRF) enables one to create a constrained version of a PRF key, which can be used to evaluate the PRF at all but some punctured points. In addition, the constrained key reveals no information about the punctured points and the PRF values on them. Existing constructions of private puncturable PRFs are only proven to be secure against a restricted adversary that must commit to the punctured points before viewing any information. It is an open problem to achieve the more natural adaptive security, where the adversary can make all its choices on-the-fly. In this work, we solve the problem by constructing an adaptively secure private puncturable PRF from standard lattice assumptions. To achieve this goal, we present a new primitive called explainable hash, which allows one to reprogram the hash function on a given input. The new primitive may find further applications in constructing more cryptographic schemes with adaptive security. Besides, our construction has collusion resistant pseudorandomness, which requires that even given multiple constrained keys, no one could learn the values of the PRF at the punctured points. Private puncturable PRFs with collusion resistant pseudorandomness were only known from multilinear maps or indistinguishability obfuscations in previous works, and we provide the first solution from standard lattice assumptions.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A major revision of an IACR publication in EUROCRYPT 2023
Contact author(s)
orbbyrp @ gmail com
History
2023-02-21: approved
2023-02-20: received
See all versions
Short URL
https://ia.cr/2023/234
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/234,
      author = {Rupeng Yang},
      title = {Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness},
      howpublished = {Cryptology ePrint Archive, Paper 2023/234},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/234}},
      url = {https://eprint.iacr.org/2023/234}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.