Abstract
We give the first construction of a practical threshold pseudo- random function.The protocol for evaluating the function is efficient enough that it can be used to replace random oracles in some protocols relying on such oracles. In particular, we show how to transform the efficient cryptographically secure Byzantine agreement protocol by Cachin, Kursawe and Shoup for the random oracle model into a cryptographically secure protocol for the complexity theoretic model without loosing efficiency or resilience,thereby constructing an efficient and optimally resilient Byzantine agreement protocol for the complexity theoretic model.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Ernest F. Brickell, Giovanni Di Crescenzo, and Yair Frankel. Sharing blockciphers.In Ed Dawson, Andrew Clark, and Colin Boyd,editors,Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10–12,2000, Proceedings, pages 457–470.Springer, 2000.
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption.In 38th Annual Symposium on Foundations of Computer Science [IEE97].
Ran Canetti. Universally composable security:A new paradigm for cryptographic protocols.In 42th Annual Symposium on Foundations of Computer Science.IEEE, 2001.
Ran Canetti, Oded Goldreich, and Shai Halevi.The random oracle methodology, revisited (preliminary version).In Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing,pages 209–218, Dallas, TX,USA, 24–26 May 1998.
Ran Canetti, Shai Halevi, and Amir Herzberg. Maintaining authenticated communication in the presence of break-ins.Journal of Cryptology,13(1):61–106,winter 2000.
Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in constantinople:Practical asynchronous byzantine agreement using cryptography.In Proceedings of the 19th ACM Symposium on Principles of Distributed Computing (PODC 2000),pages 123–132.ACM, July 2000.
D. Chaum and T.P. Pedersen.Wallet databases with observers.InErnest F. Brickell,editor,Advances in Cryptology-Crypto’ 92,pages 89–105,Berlin,1992.Springer-Verlag.Lecture Notes in Computer ScienceVolume 740.
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. Journal of the ACM, 33(4):792–807,1986.
Oded Goldreich.The Foundations of Cryptography, volume 1.Cambridge University Press, 2001.
IEEE. 38th Annual Symposium on Foundations of Computer Science,Miami Beach,FL,19-22 October 1997.
Silvio Micali and Ray Sidney. A simple method for generating and sharing pseudo-random functions,with applications to clipper-like escrow systems.In Don Coppersmith,editor, Advances in Cryptology-Crypto’ 95,pages 185–196, Berlin,1995.Springer-Verlag. Lecture Notes in Computer ScienceVolume 963.
Jesper B. Nielsen. Separating random oracle proofs from complexity theoretic proofs: the non-committing encryption case.In Advances in Cryptology-Crypto’ 02, 2002.
Moni Naor, Benny Pinkas, and Omer Reingold. Distributed pseudo-random functions and KDCs.In Jacques Stern,editor, Advances in Cryptology-EuroCrypt’ 99,pages 327–346, Berlin,1999.Springer-Verlag.Lecture Notes in Computer Science Volume 1592.
Moni Naor and Omer Reingold. Number-theoretic constructions of efficient pseudo-random functions (extended abstract).In 38th Annual Symposium on Foundations of Computer Science [IEE97],pages 458–467.
Victor Shoup.Practical threshold signatures.In Bart Preneel,editor,Advances in Cryptology-EuroCrypt 2000,pages 207–220, Berlin, 2000.Springer-Verlag. Lecture Notes in Computer ScienceVolume 1807.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nielsen, J.B. (2002). A Threshold Pseudorandom Function Construction and Its Applications. In: Yung, M. (eds) Advances in Cryptology — CRYPTO 2002. CRYPTO 2002. Lecture Notes in Computer Science, vol 2442. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45708-9_26
Download citation
DOI: https://doi.org/10.1007/3-540-45708-9_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44050-5
Online ISBN: 978-3-540-45708-4
eBook Packages: Springer Book Archive