File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-031-35486-1_22
- Scopus: eid_2-s2.0-85164723977
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Book Chapter: Practical Verifiable Random Function with RKA Security
Title | Practical Verifiable Random Function with RKA Security |
---|---|
Authors | |
Keywords | universal composability Verifiable random function VRF |
Issue Date | 5-Jul-2023 |
Publisher | Springer |
Abstract | A verifiable random function (VRF) allows the generation of a random number with publicly verifiable proof, showing that the random number is honestly generated. The practical VRF used in real-world applications considers the security of uniqueness, pseudorandomness, and unpredictability under malicious key generation. In this paper, we propose the security model of related-key attack to VRF for capturing attacks like tampering attacks. We propose a new construction of VRF that satisfies the RKA security together with the existing security requirements. We implement our VRF construction and demonstrate that our scheme is practical for real-world applications. |
Persistent Identifier | http://hdl.handle.net/10722/337170 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yuen, Tsz Hon | - |
dc.contributor.author | Pan, Shimin | - |
dc.contributor.author | Huang, Sheng | - |
dc.contributor.author | Zhang, Xiaoting | - |
dc.date.accessioned | 2024-03-11T10:18:38Z | - |
dc.date.available | 2024-03-11T10:18:38Z | - |
dc.date.issued | 2023-07-05 | - |
dc.identifier.isbn | 9783031354854 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/337170 | - |
dc.description.abstract | <p> A verifiable random function (VRF) allows the generation of a random number with publicly verifiable proof, showing that the random number is honestly generated. The practical VRF used in real-world applications considers the security of uniqueness, pseudorandomness, and unpredictability under malicious key generation. In this paper, we propose the security model of <em>related-key attack</em> to VRF for capturing attacks like tampering attacks. We propose a new construction of VRF that satisfies the RKA security together with the existing security requirements. We implement our VRF construction and demonstrate that our scheme is practical for real-world applications. <br></p> | - |
dc.language | eng | - |
dc.publisher | Springer | - |
dc.relation.ispartof | Information Security and Privacy | - |
dc.subject | universal composability | - |
dc.subject | Verifiable random function | - |
dc.subject | VRF | - |
dc.title | Practical Verifiable Random Function with RKA Security | - |
dc.type | Book_Chapter | - |
dc.identifier.doi | 10.1007/978-3-031-35486-1_22 | - |
dc.identifier.scopus | eid_2-s2.0-85164723977 | - |
dc.identifier.volume | 13915 LNCS | - |
dc.identifier.spage | 503 | - |
dc.identifier.epage | 522 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.eisbn | 9783031354861 | - |
dc.identifier.issnl | 0302-9743 | - |