International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Adaptive Security for Constrained PRFs

Authors:
Kaishuo Cheng , Georgia Institute of Technology
Joseph Jaeger , Georgia Institute of Technology
Download:
Search ePrint
Search Google
Conference: CRYPTO 2025
Abstract: There is a gap between the security of constrained PRFs required in some applications and the security provided by existing definitions. This gap is typically patched by only considering nonadaptive security or manually mixing the CPRF with a random oracle (implicitly constructing a new CPRF) to achieve adaptive security. We fill this gap with a new definition for constrained PRFs with strong adaptive security properties and proofs that it is achieved by practical constructions based on the cascade PRF (which generalized GGM) and AMAC. We apply the definition for analyzing searchable symmetric encryption and puncturable key wrapping.
BibTeX
@inproceedings{crypto-2025-35815,
  title={Adaptive Security for Constrained PRFs},
  publisher={Springer-Verlag},
  author={Kaishuo Cheng and Joseph Jaeger},
  year=2025
}