Constructions of PRF (Pseudo Random Function)The Goldreich-Goldwasser-Micali Construction with bad PRGSSecurity of KDF1 and KDF2 (hash based KDF's)Implementing a pseudo random function in practiceCryptanalysis of Marvin32 compared to SipHashPseudo Random FunctionWhy is this function pseudo random (PRF)?Decentralized consent over a random numberExistence of PRF $implies$ existence of PRGDoes a distinguisher for an PRF based on a hash make the hash function insecure?Can we convert a pseudorandom function (PRF) to an Oblivious PRF (OPRF) through an Oblivious Transfer (OT) protocol?

Was there a Viking Exchange as well as a Columbian one?

What happens to Mjolnir (Thor's hammer) at the end of Endgame?

can anyone help me with this awful query plan?

Read line from file and process something

Extension of 2-adic valuation to the real numbers

How did Captain America manage to do this?

Does a large simulator bay have standard public address announcements?

Can't get 5V 3A DC constant

Does tea made with boiling water cool faster than tea made with boiled (but still hot) water?

Function pointer with named arguments?

How can I get this effect? Please see the attached image

Can an Area of Effect spell cast outside a Prismatic Wall extend inside it?

What are the steps to solving this definite integral?

Like totally amazing interchangeable sister outfits II: The Revenge

Rivers without rain

Retract an already submitted recommendation letter (written for an undergrad student)

How does Captain America channel this power?

Contradiction proof for inequality of P and NP?

Why does Mind Blank stop the Feeblemind spell?

How to limit Drive Letters Windows assigns to new removable USB drives

"The cow" OR "a cow" OR "cows" in this context

"Whatever a Russian does, they end up making the Kalashnikov gun"? Are there any similar proverbs in English?

Checks user level and limit the data before saving it to mongoDB

a sore throat vs a strep throat vs strep throat



Constructions of PRF (Pseudo Random Function)


The Goldreich-Goldwasser-Micali Construction with bad PRGSSecurity of KDF1 and KDF2 (hash based KDF's)Implementing a pseudo random function in practiceCryptanalysis of Marvin32 compared to SipHashPseudo Random FunctionWhy is this function pseudo random (PRF)?Decentralized consent over a random numberExistence of PRF $implies$ existence of PRGDoes a distinguisher for an PRF based on a hash make the hash function insecure?Can we convert a pseudorandom function (PRF) to an Oblivious PRF (OPRF) through an Oblivious Transfer (OT) protocol?













2












$begingroup$


I was taught only GGM based PRF construction in class. It's very inefficient. I am just curious about various PRF constructions from standard assumptions. Please provide a few PRF constructions from various assumptions.










share|improve this question









$endgroup$











  • $begingroup$
    Well, one standard assumption is that the SHA-256 compression function is a PRF, from which we can conclude that HMAC-SHA256 is a PRF (and a reasonably efficient one at that), but maybe you meant to restrict the domain of ‘standard assumptions’?
    $endgroup$
    – Squeamish Ossifrage
    3 hours ago
















2












$begingroup$


I was taught only GGM based PRF construction in class. It's very inefficient. I am just curious about various PRF constructions from standard assumptions. Please provide a few PRF constructions from various assumptions.










share|improve this question









$endgroup$











  • $begingroup$
    Well, one standard assumption is that the SHA-256 compression function is a PRF, from which we can conclude that HMAC-SHA256 is a PRF (and a reasonably efficient one at that), but maybe you meant to restrict the domain of ‘standard assumptions’?
    $endgroup$
    – Squeamish Ossifrage
    3 hours ago














2












2








2





$begingroup$


I was taught only GGM based PRF construction in class. It's very inefficient. I am just curious about various PRF constructions from standard assumptions. Please provide a few PRF constructions from various assumptions.










share|improve this question









$endgroup$




I was taught only GGM based PRF construction in class. It's very inefficient. I am just curious about various PRF constructions from standard assumptions. Please provide a few PRF constructions from various assumptions.







pseudo-random-generator pseudo-random-function






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked 4 hours ago









satyasatya

441317




441317











  • $begingroup$
    Well, one standard assumption is that the SHA-256 compression function is a PRF, from which we can conclude that HMAC-SHA256 is a PRF (and a reasonably efficient one at that), but maybe you meant to restrict the domain of ‘standard assumptions’?
    $endgroup$
    – Squeamish Ossifrage
    3 hours ago

















  • $begingroup$
    Well, one standard assumption is that the SHA-256 compression function is a PRF, from which we can conclude that HMAC-SHA256 is a PRF (and a reasonably efficient one at that), but maybe you meant to restrict the domain of ‘standard assumptions’?
    $endgroup$
    – Squeamish Ossifrage
    3 hours ago
















$begingroup$
Well, one standard assumption is that the SHA-256 compression function is a PRF, from which we can conclude that HMAC-SHA256 is a PRF (and a reasonably efficient one at that), but maybe you meant to restrict the domain of ‘standard assumptions’?
$endgroup$
– Squeamish Ossifrage
3 hours ago





$begingroup$
Well, one standard assumption is that the SHA-256 compression function is a PRF, from which we can conclude that HMAC-SHA256 is a PRF (and a reasonably efficient one at that), but maybe you meant to restrict the domain of ‘standard assumptions’?
$endgroup$
– Squeamish Ossifrage
3 hours ago











1 Answer
1






active

oldest

votes


















4












$begingroup$

The most common efficient PRFs from specific assumptions are:



The Naor-Reingold PRF, which is based on the decision Diffie-Hellman assumption (DDH), and



The BPR PRF, which is based on the learning with error assumption (LWE).



Perhaps slightly less well-known is the NRR PRF, which is based on the hardness of factoring.






share|improve this answer









$endgroup$













    Your Answer








    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "281"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: false,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: null,
    bindNavPrevention: true,
    postfix: "",
    imageUploader:
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    ,
    noCode: true, onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );













    draft saved

    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f70083%2fconstructions-of-prf-pseudo-random-function%23new-answer', 'question_page');

    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    4












    $begingroup$

    The most common efficient PRFs from specific assumptions are:



    The Naor-Reingold PRF, which is based on the decision Diffie-Hellman assumption (DDH), and



    The BPR PRF, which is based on the learning with error assumption (LWE).



    Perhaps slightly less well-known is the NRR PRF, which is based on the hardness of factoring.






    share|improve this answer









    $endgroup$

















      4












      $begingroup$

      The most common efficient PRFs from specific assumptions are:



      The Naor-Reingold PRF, which is based on the decision Diffie-Hellman assumption (DDH), and



      The BPR PRF, which is based on the learning with error assumption (LWE).



      Perhaps slightly less well-known is the NRR PRF, which is based on the hardness of factoring.






      share|improve this answer









      $endgroup$















        4












        4








        4





        $begingroup$

        The most common efficient PRFs from specific assumptions are:



        The Naor-Reingold PRF, which is based on the decision Diffie-Hellman assumption (DDH), and



        The BPR PRF, which is based on the learning with error assumption (LWE).



        Perhaps slightly less well-known is the NRR PRF, which is based on the hardness of factoring.






        share|improve this answer









        $endgroup$



        The most common efficient PRFs from specific assumptions are:



        The Naor-Reingold PRF, which is based on the decision Diffie-Hellman assumption (DDH), and



        The BPR PRF, which is based on the learning with error assumption (LWE).



        Perhaps slightly less well-known is the NRR PRF, which is based on the hardness of factoring.







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered 3 hours ago









        Geoffroy CouteauGeoffroy Couteau

        9,29011834




        9,29011834



























            draft saved

            draft discarded
















































            Thanks for contributing an answer to Cryptography Stack Exchange!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid


            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.

            Use MathJax to format equations. MathJax reference.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f70083%2fconstructions-of-prf-pseudo-random-function%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Are there any AGPL-style licences that require source code modifications to be public? Planned maintenance scheduled April 23, 2019 at 23:30 UTC (7:30pm US/Eastern) Announcing the arrival of Valued Associate #679: Cesar Manara Unicorn Meta Zoo #1: Why another podcast?Force derivative works to be publicAre there any GPL like licenses for Apple App Store?Do you violate the GPL if you provide source code that cannot be compiled?GPL - is it distribution to use libraries in an appliance loaned to customers?Distributing App for free which uses GPL'ed codeModifications of server software under GPL, with web/CLI interfaceDoes using an AGPLv3-licensed library prevent me from dual-licensing my own source code?Can I publish only select code under GPLv3 from a private project?Is there published precedent regarding the scope of covered work that uses AGPL software?If MIT licensed code links to GPL licensed code what should be the license of the resulting binary program?If I use a public API endpoint that has its source code licensed under AGPL in my app, do I need to disclose my source?

            2013 GY136 Descoberta | Órbita | Referências Menu de navegação«List Of Centaurs and Scattered-Disk Objects»«List of Known Trans-Neptunian Objects»

            Metrô de Los Teques Índice Linhas | Estações | Ver também | Referências Ligações externas | Menu de navegação«INSTITUCIÓN»«Mapa de rutas»originalMetrô de Los TequesC.A. Metro Los Teques |Alcaldía de Guaicaipuro – Sitio OficialGobernacion de Mirandaeeeeeee