File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-031-35486-1_22
- Scopus: eid_2-s2.0-85164723977
- WOS: WOS:001310807200022
- Find via

Supplementary
- Citations:
- Appears in Collections:
Book Chapter: Practical Verifiable Random Function with RKA Security
| Title | Practical Verifiable Random Function with RKA Security |
|---|---|
| Authors | |
| Keywords | universal composability Verifiable random function VRF |
| Issue Date | 5-Jul-2023 |
| Publisher | Springer |
| Abstract | A verifiable random function (VRF) allows the generation of a random number with publicly verifiable proof, showing that the random number is honestly generated. The practical VRF used in real-world applications considers the security of uniqueness, pseudorandomness, and unpredictability under malicious key generation. In this paper, we propose the security model of related-key attack to VRF for capturing attacks like tampering attacks. We propose a new construction of VRF that satisfies the RKA security together with the existing security requirements. We implement our VRF construction and demonstrate that our scheme is practical for real-world applications. |
| Persistent Identifier | http://hdl.handle.net/10722/337170 |
| ISBN | |
| ISSN | 2023 SCImago Journal Rankings: 0.606 |
| ISI Accession Number ID |
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Yuen, Tsz Hon | - |
| dc.contributor.author | Pan, Shimin | - |
| dc.contributor.author | Huang, Sheng | - |
| dc.contributor.author | Zhang, Xiaoting | - |
| dc.date.accessioned | 2024-03-11T10:18:38Z | - |
| dc.date.available | 2024-03-11T10:18:38Z | - |
| dc.date.issued | 2023-07-05 | - |
| dc.identifier.isbn | 9783031354854 | - |
| dc.identifier.issn | 0302-9743 | - |
| dc.identifier.uri | http://hdl.handle.net/10722/337170 | - |
| dc.description.abstract | <p> A verifiable random function (VRF) allows the generation of a random number with publicly verifiable proof, showing that the random number is honestly generated. The practical VRF used in real-world applications considers the security of uniqueness, pseudorandomness, and unpredictability under malicious key generation. In this paper, we propose the security model of <em>related-key attack</em> to VRF for capturing attacks like tampering attacks. We propose a new construction of VRF that satisfies the RKA security together with the existing security requirements. We implement our VRF construction and demonstrate that our scheme is practical for real-world applications. <br></p> | - |
| dc.language | eng | - |
| dc.publisher | Springer | - |
| dc.relation.ispartof | Information Security and Privacy | - |
| dc.subject | universal composability | - |
| dc.subject | Verifiable random function | - |
| dc.subject | VRF | - |
| dc.title | Practical Verifiable Random Function with RKA Security | - |
| dc.type | Book_Chapter | - |
| dc.identifier.doi | 10.1007/978-3-031-35486-1_22 | - |
| dc.identifier.scopus | eid_2-s2.0-85164723977 | - |
| dc.identifier.volume | 13915 LNCS | - |
| dc.identifier.spage | 503 | - |
| dc.identifier.epage | 522 | - |
| dc.identifier.eissn | 1611-3349 | - |
| dc.identifier.isi | WOS:001310807200022 | - |
| dc.identifier.eisbn | 9783031354861 | - |
| dc.identifier.issnl | 0302-9743 | - |
