{"acknowledgement":"We are grateful to Mihir Bellare for his feedback on earlier versions of this paper. We are indebted to Vanishree Rao for her generous assistance in preparing this proceedings version.","citation":{"apa":"Fuchsbauer, G., Konstantinov, M., Pietrzak, K. Z., & Rao, V. (2014). Adaptive security of constrained PRFs (Vol. 8874, pp. 173–192). Presented at the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer. https://doi.org/10.1145/2591796.2591825","ista":"Fuchsbauer G, Konstantinov M, Pietrzak KZ, Rao V. 2014. Adaptive security of constrained PRFs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8874, 173–192.","chicago":"Fuchsbauer, Georg, Momchil Konstantinov, Krzysztof Z Pietrzak, and Vanishree Rao. “Adaptive Security of Constrained PRFs,” 8874:173–92. Springer, 2014. https://doi.org/10.1145/2591796.2591825.","ieee":"G. Fuchsbauer, M. Konstantinov, K. Z. Pietrzak, and V. Rao, “Adaptive security of constrained PRFs,” presented at the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, vol. 8874, pp. 173–192.","mla":"Fuchsbauer, Georg, et al. Adaptive Security of Constrained PRFs. Vol. 8874, Springer, 2014, pp. 173–92, doi:10.1145/2591796.2591825.","ama":"Fuchsbauer G, Konstantinov M, Pietrzak KZ, Rao V. Adaptive security of constrained PRFs. In: Vol 8874. Springer; 2014:173-192. doi:10.1145/2591796.2591825","short":"G. Fuchsbauer, M. Konstantinov, K.Z. Pietrzak, V. Rao, in:, Springer, 2014, pp. 173–192."},"month":"01","date_created":"2018-12-11T11:54:45Z","publisher":"Springer","status":"public","year":"2014","page":"173 - 192","day":"01","date_published":"2014-01-01T00:00:00Z","oa":1,"publist_id":"5167","date_updated":"2021-01-12T06:54:08Z","volume":8874,"extern":1,"type":"conference","intvolume":" 8874","main_file_link":[{"open_access":"1","url":"http://eprint.iacr.org/2014/416"}],"_id":"1927","doi":"10.1145/2591796.2591825","author":[{"first_name":"Georg","full_name":"Georg Fuchsbauer","last_name":"Fuchsbauer","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Konstantinov","first_name":"Momchil","full_name":"Konstantinov, Momchil"},{"last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","first_name":"Krzysztof Z","full_name":"Krzysztof Pietrzak","orcid":"0000-0002-9139-1654"},{"full_name":"Rao, Vanishree","first_name":"Vanishree","last_name":"Rao"}],"conference":{"name":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},"quality_controlled":0,"title":"Adaptive security of constrained PRFs","publication_status":"published","abstract":[{"lang":"eng","text":"Constrained pseudorandom functions have recently been introduced independently by Boneh and Waters (Asiacrypt’13), Kiayias et al. (CCS’13), and Boyle et al. (PKC’14). In a standard pseudorandom function (PRF) a key k is used to evaluate the PRF on all inputs in the domain. Constrained PRFs additionally offer the functionality to delegate “constrained” keys kS which allow to evaluate the PRF only on a subset S of the domain. The three above-mentioned papers all show that the classical GGM construction (J.ACM’86) of a PRF from a pseudorandom generator (PRG) directly yields a constrained PRF where one can compute constrained keys to evaluate the PRF on all inputs with a given prefix. This constrained PRF has already found many interesting applications. Unfortunately, the existing security proofs only show selective security (by a reduction to the security of the underlying PRG). To achieve full security, one has to use complexity leveraging, which loses an exponential factor 2N in security, where N is the input length. The first contribution of this paper is a new reduction that only loses a quasipolynomial factor qlog N, where q is the number of adversarial queries. For this we develop a new proof technique which constructs a distinguisher by interleaving simple guessing steps and hybrid arguments a small number of times. This approach might be of interest also in other contexts where currently the only technique to achieve full security is complexity leveraging. Our second contribution is concerned with another constrained PRF, due to Boneh and Waters, which allows for constrained keys for the more general class of bit-fixing functions. Their security proof also suffers from a 2N loss, which we show is inherent. We construct a meta-reduction which shows that any “simple” reduction of full security from a noninteractive hardness assumption must incur an exponential security loss."}]}