Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences最新文献

筛选
英文 中文
Instantiating the Hash-then-evaluate paradigm: Strengthening PRFs, PCFs, and OPRFs. 实例化Hash-then-evaluate范式:加强prf、pcf和oprf。
IF 1.1 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2025-01-01 Epub Date: 2025-08-13 DOI: 10.1007/s12095-025-00825-3
Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, Pierre Meyer
{"title":"Instantiating the Hash-then-evaluate paradigm: Strengthening PRFs, PCFs, and OPRFs.","authors":"Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, Pierre Meyer","doi":"10.1007/s12095-025-00825-3","DOIUrl":"https://doi.org/10.1007/s12095-025-00825-3","url":null,"abstract":"<p><p>We instantiate the hash-then-evaluate paradigm for pseudorandom functions (PRFs), <math><mrow><mi>PRF</mi> <mo>(</mo> <mi>k</mi> <mo>,</mo> <mi>x</mi> <mo>)</mo> <mo>:</mo> <mo>=</mo> <mi>wPRF</mi> <mo>(</mo> <mi>k</mi> <mo>,</mo> <mi>RO</mi> <mo>(</mo> <mi>x</mi> <mo>)</mo> <mo>)</mo></mrow> </math> , which builds a PRF <math><mi>PRF</mi></math> from a weak PRF <math><mi>wPRF</mi></math> via a <i>public</i> pre-processing random oracle <math><mi>RO</mi></math> . In applications to secure multiparty computation (MPC), only the low-complexity <math><mi>wPRF</mi></math> performs secret-depending operations. Our construction replaces <math><mi>RO</mi></math> by <math><mrow><mi>f</mi> <mo>(</mo> <msub><mi>k</mi> <mi>H</mi></msub> <mo>,</mo> <mi>elf</mi> <mrow><mo>(</mo> <mi>x</mi> <mo>)</mo></mrow> <mo>)</mo></mrow> </math> , where <i>f</i> is a non-adaptive PRF and the key <math><msub><mi>k</mi> <mi>H</mi></msub> </math> is <i>public</i> and thus known to the distinguishing adversary. We show that, perhaps surprisingly, several existing weak PRF candidates are plausibly also secure when their inputs are generated by <math><mrow><mi>f</mi> <mo>(</mo> <msub><mi>k</mi> <mi>H</mi></msub> <mo>,</mo> <mi>elf</mi> <mrow><mo>(</mo> <mo>.</mo> <mo>)</mo></mrow> <mo>)</mo></mrow> </math> . Firstly, analogous cryptanalysis applies (because pseudorandomness of <i>f</i> implies good statistical properties) and/or secondly an attack against the weak PRF with such pseudorandom inputs generated by <i>f</i> would imply surprising results such as key agreement from the hardness of the high-noise version of the Learning Parity with Noise (LPN) when implementing both <math><mi>wPRF</mi></math> and <i>f</i> from this assumption. Our simple transformation of replacing <math><mrow><mi>RO</mi> <mo>(</mo> <mo>·</mo> <mo>)</mo></mrow> </math> public pre-processing by <math><mrow><mi>f</mi> <mo>(</mo> <msub><mi>k</mi> <mi>H</mi></msub> <mo>,</mo> <mi>elf</mi> <mrow><mo>(</mo> <mi>x</mi> <mo>)</mo></mrow> <mo>)</mo></mrow> </math> public pre-processing applies to the entire family of PRF-style functions. Specifically, we obtain results for oblivious PRFs, which are a core building block for password-based authenticated key exchange (PAKE) and private set intersection (PSI) protocols, and we also obtain results for pseudorandom correlation functions (PCF), which are a key tool for silent oblivious transfer (OT) extension.</p>","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"17 5","pages":"1325-1366"},"PeriodicalIF":1.1,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12474740/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145187094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three classes of permutation quadrinomials in odd characteristic 奇特征的三类置换四项
IF 1.4 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-09-05 DOI: 10.1007/s12095-023-00672-0
Changhui Chen, H.-B. Kan, Jie Peng, Lijing Zheng, Yanjun Li
{"title":"Three classes of permutation quadrinomials in odd characteristic","authors":"Changhui Chen, H.-B. Kan, Jie Peng, Lijing Zheng, Yanjun Li","doi":"10.1007/s12095-023-00672-0","DOIUrl":"https://doi.org/10.1007/s12095-023-00672-0","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43062328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The cross-correlation spectrum of ternary perfect sequences and their decimations 三元完全序列的互相关谱及其抽取
IF 1.4 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-09-04 DOI: 10.1007/s12095-023-00671-1
Xinxin Lv, Cuiling Fan, Yanyan Wang
{"title":"The cross-correlation spectrum of ternary perfect sequences and their decimations","authors":"Xinxin Lv, Cuiling Fan, Yanyan Wang","doi":"10.1007/s12095-023-00671-1","DOIUrl":"https://doi.org/10.1007/s12095-023-00671-1","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47095224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Further Results on Affine Sub-Families of NFSR Sequences 关于NFSR序列仿射子族的进一步结果
IF 1.4 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-08-21 DOI: 10.1007/s12095-023-00663-1
Cheng Che, Tian Tian
{"title":"Further Results on Affine Sub-Families of NFSR Sequences","authors":"Cheng Che, Tian Tian","doi":"10.1007/s12095-023-00663-1","DOIUrl":"https://doi.org/10.1007/s12095-023-00663-1","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46560892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lower bound for differential uniformity by multiplicative complexity & bijective functions of multiplicative complexity 1 over finite fields 有限域上乘性复杂度的微分均匀性的下界&乘性复杂度为1的双目标函数
IF 1.4 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-08-15 DOI: 10.1007/s12095-023-00661-3
M. Steiner
{"title":"A lower bound for differential uniformity by multiplicative complexity & bijective functions of multiplicative complexity 1 over finite fields","authors":"M. Steiner","doi":"10.1007/s12095-023-00661-3","DOIUrl":"https://doi.org/10.1007/s12095-023-00661-3","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44741373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lower bounds on the maximum cross-correlations of 2-D quasi-complementary array sets 二维拟互补阵列集最大互相关的下界
IF 1.4 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-08-09 DOI: 10.1007/s12095-023-00665-z
A. Roy, S. Majhi
{"title":"Lower bounds on the maximum cross-correlations of 2-D quasi-complementary array sets","authors":"A. Roy, S. Majhi","doi":"10.1007/s12095-023-00665-z","DOIUrl":"https://doi.org/10.1007/s12095-023-00665-z","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44137590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperbent functions from hyperovals 超椭圆的超弯函数
IF 1.4 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-08-07 DOI: 10.1007/s12095-023-00668-w
K. Abdukhalikov, Duy Ho
{"title":"Hyperbent functions from hyperovals","authors":"K. Abdukhalikov, Duy Ho","doi":"10.1007/s12095-023-00668-w","DOIUrl":"https://doi.org/10.1007/s12095-023-00668-w","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"15 1","pages":"1031 - 1048"},"PeriodicalIF":1.4,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45294725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The welch-gong stream cipher - evolutionary path welch-gong流密码演化路径
IF 1.4 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-08-05 DOI: 10.1007/s12095-023-00656-0
N. Zidarič, K. Mandal, G. Gong, M. Aagaard
{"title":"The welch-gong stream cipher - evolutionary path","authors":"N. Zidarič, K. Mandal, G. Gong, M. Aagaard","doi":"10.1007/s12095-023-00656-0","DOIUrl":"https://doi.org/10.1007/s12095-023-00656-0","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42223998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vectorial bent functions and linear codes from quadratic forms 向量弯函数与二次型线性码
IF 1.4 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-08-02 DOI: 10.1007/s12095-023-00664-0
Xianhong Xie, Ouyang Yi, Ming Mao
{"title":"Vectorial bent functions and linear codes from quadratic forms","authors":"Xianhong Xie, Ouyang Yi, Ming Mao","doi":"10.1007/s12095-023-00664-0","DOIUrl":"https://doi.org/10.1007/s12095-023-00664-0","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"68 s277","pages":"1011 - 1029"},"PeriodicalIF":1.4,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41255443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distribution of the autocorrelation of random Boolean functions 随机布尔函数的自相关分布
IF 1.4 3区 计算机科学
Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences Pub Date : 2023-07-17 DOI: 10.1007/s12095-023-00653-3
F. Rodier, Florian Caullery, Eric Férard
{"title":"Distribution of the autocorrelation of random Boolean functions","authors":"F. Rodier, Florian Caullery, Eric Férard","doi":"10.1007/s12095-023-00653-3","DOIUrl":"https://doi.org/10.1007/s12095-023-00653-3","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"15 1","pages":"995 - 1009"},"PeriodicalIF":1.4,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47562387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信