Instantiating the Hash-Then-Evaluate Paradigm : Strengthening PRFs, PCFs, and OPRFs

Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, Pierre Meyer*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

1 Citation (Scopus)

Abstract

We instantiate the hash-then-evaluate paradigm for pseudorandom functions (PRFs), PRF(k,x):=wPRF(k,RO(x)), which builds a PRF PRF from a weak PRF wPRF via a public pre-processing random oracle RO. In applications to secure multiparty computation (MPC), only the low-complexity wPRF performs secret-depending operations. Our construction replaces RO by f(kH,elf(x)), where f is a non-adaptive PRF and the key kH is public and thus known to the distinguishing adversary. We show that, perhaps surprisingly, several existing weak PRF candidates are plausibly also secure when their inputs are generated by f(kH,elf(.)). Firstly, analogous cryptanalysis applies (because pseudorandomness of f implies good statistical properties) and/or secondly an attack against the weak PRF with such pseudorandom inputs generated by f would imply surprising results such as key agreement from the hardness of the high-noise version of the Learning Parity with Noise (LPN) when implementing both wPRF and f from this assumption. Our simple transformation of replacing RO(·) public pre-processing by f(kH,elf(x)) public pre-processing applies to the entire family of PRF-style functions. Specifically, we obtain results for oblivious PRFs, which are a core building block for password-based authenticated key exchange (PAKE) and private set intersection (PSI) protocols, and we also obtain results for pseudorandom correlation functions (PCF), which are a key tool for silent oblivious transfer (OT) extension.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks - 14th International Conference, SCN 2024, Proceedings
EditorsClemente Galdi, Duong Hieu Phan
PublisherSpringer
Pages97-116
Number of pages20
ISBN (Print)978-3-031-71072-8
DOIs
Publication statusPublished - 2024
MoE publication typeA4 Conference publication
EventConference on Security and Cryptography for Networks - Amalfi, Italy
Duration: 11 Sept 202413 Sept 2024
Conference number: 14

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14974 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceConference on Security and Cryptography for Networks
Abbreviated titleSCN
Country/TerritoryItaly
CityAmalfi
Period11/09/202413/09/2024

Keywords

  • extremely lossy functions
  • pseudorandom correlation functions
  • pseudorandom functions
  • random oracle model

Fingerprint

Dive into the research topics of 'Instantiating the Hash-Then-Evaluate Paradigm : Strengthening PRFs, PCFs, and OPRFs'. Together they form a unique fingerprint.

Cite this