CryptoDB
Adaptive Security for Constrained PRFs
Authors: |
|
---|---|
Download: | |
Conference: | CRYPTO 2025 |
Abstract: | There is a gap between the security of constrained PRFs required in some applications and the security provided by existing definitions. This gap is typically patched by only considering nonadaptive security or manually mixing the CPRF with a random oracle (implicitly constructing a new CPRF) to achieve adaptive security. We fill this gap with a new definition for constrained PRFs with strong adaptive security properties and proofs that it is achieved by practical constructions based on the cascade PRF (which generalized GGM) and AMAC. We apply the definition for analyzing searchable symmetric encryption and puncturable key wrapping. |
BibTeX
@inproceedings{crypto-2025-35815, title={Adaptive Security for Constrained PRFs}, publisher={Springer-Verlag}, author={Kaishuo Cheng and Joseph Jaeger}, year=2025 }