{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:58:11Z","timestamp":1742385491200,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,9]]},"DOI":"10.1145\/1653662.1653677","type":"proceedings-article","created":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T13:02:08Z","timestamp":1257944528000},"page":"112-120","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Efficient pseudorandom functions from the decisional linear assumption and weaker variants"],"prefix":"10.1145","author":[{"given":"Allison B.","family":"Lewko","sequence":"first","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]},{"given":"Brent","family":"Waters","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, Uae"}]}],"member":"320","published-online":{"date-parts":[[2009,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1979.2"},{"key":"e_1_3_2_1_2_1","series-title":"LNCS","first-page":"1","volume-title":"Advances in Cryptology -- CRYPTO'96","author":"Bellare M.","year":"1996","unstructured":"M. Bellare , R. Canetti , and H. Krawczyk . Keying hash functions for message authentication . In Advances in Cryptology -- CRYPTO'96 , volume 1109 of LNCS , pages 1 -- 16 . Springer , 1996 . M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology -- CRYPTO'96, volume 1109 of LNCS, pages 1--16. Springer, 1996."},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/0-387-34805-0_19","volume-title":"Advances in Cryptology -- CRYPTO'89","author":"Bellare M.","year":"1990","unstructured":"M. Bellare and S. Goldwasser . New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs . In Advances in Cryptology -- CRYPTO'89 , volume 435 of LNCS , pages 194 -- 211 . Springer , 1990 . M. Bellare and S. Goldwasser. New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs. In Advances in Cryptology -- CRYPTO'89, volume 435 of LNCS, pages 194--211. Springer, 1990."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_3"},{"key":"e_1_3_2_1_5_1","series-title":"LNCS","first-page":"41","volume-title":"Advances in Cryptology -- CRYPTO","author":"Boneh D.","year":"2004","unstructured":"D. Boneh , X. Boyen , and H. Shacham . Short group signatures . In Advances in Cryptology -- CRYPTO 2004 , volume 3152 of LNCS , pages 41 -- 55 . Springer , 2004. D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In Advances in Cryptology -- CRYPTO 2004, volume 3152 of LNCS, pages 41--55. Springer, 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"An efficient off-line electronic cash system based on the representation problem","author":"Brands S.","year":"1993","unstructured":"S. Brands . An efficient off-line electronic cash system based on the representation problem . 1993 . S. Brands. An efficient off-line electronic cash system based on the representation problem. 1993."},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","volume-title":"Modern cryptology","author":"Brassard G.","year":"1988","unstructured":"G. Brassard . Modern cryptology . volume 325 of LNCS . Springer , 1988 . G. Brassard. Modern cryptology. volume 325 of LNCS. Springer, 1988."},{"key":"e_1_3_2_1_8_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology -- CRYPTO'98","author":"Cramer R.","year":"1998","unstructured":"R. Cramer and V. Shoup . A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack . In Advances in Cryptology -- CRYPTO'98 , volume 1462 of LNCS , pages 13 -- 25 . Springer , 1998 . R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology -- CRYPTO'98, volume 1462 of LNCS, pages 13--25. Springer, 1998."},{"key":"e_1_3_2_1_9_1","volume-title":"The tls protocol version 1.0. rfc 2246","author":"Dierks T.","year":"1999","unstructured":"T. Dierks and C. Allen . The tls protocol version 1.0. rfc 2246 . January 1999 . T. Dierks and C. Allen. The tls protocol version 1.0. rfc 2246. January 1999."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","first-page":"10","volume-title":"Advances in Cryptology -- CRYPTO'84","author":"ElGamal T.","year":"1985","unstructured":"T. ElGamal . A public-key cryptosystem and a signature scheme based on discrete logarithms . In Advances in Cryptology -- CRYPTO'84 , volume 196 of LNCS , pages 10 -- 18 . Springer , 1985 . T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology -- CRYPTO'84, volume 196 of LNCS, pages 10--18. Springer, 1985."},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"104","volume-title":"Advances in Cryptology -- CRYPTO '84","author":"Goldreich O.","year":"1987","unstructured":"O. Goldreich . Two remarks concerning the goldwasser-micali-rivest signature scheme . In Advances in Cryptology -- CRYPTO '84 , volume 263 of LNCS , pages 104 -- 110 . Springer , 1987 . O. Goldreich. Two remarks concerning the goldwasser-micali-rivest signature scheme. In Advances in Cryptology -- CRYPTO '84, volume 263 of LNCS, pages 104--110. Springer, 1987."},{"key":"e_1_3_2_1_13_1","series-title":"LNCS","first-page":"276","volume-title":"Advances in Cryptology -- CRYPTO'84","author":"Goldreich O.","year":"1985","unstructured":"O. Goldreich , S. Goldwasser , and S. Micali . On the cryptographic applications of random functions . In Advances in Cryptology -- CRYPTO'84 , volume 196 of LNCS , pages 276 -- 288 . Springer , 1985 . O. Goldreich, S. Goldwasser, and S. Micali. On the cryptographic applications of random functions. In Advances in Cryptology -- CRYPTO'84, volume 196 of LNCS, pages 276--288. Springer, 1985."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"e_1_3_2_1_16_1","series-title":"LNCS","first-page":"553","volume-title":"Advances in Cryptology -- CRYPTO","author":"Hofheinz D.","year":"2007","unstructured":"D. Hofheinz and E. Kiltz . Secure hybrid encryption from weakened key encapsulation . In Advances in Cryptology -- CRYPTO 2007 , volume 4622 of LNCS , pages 553 -- 571 . Springer , 2007. D. Hofheinz and E. Kiltz. Secure hybrid encryption from weakened key encapsulation. In Advances in Cryptology -- CRYPTO 2007, volume 4622 of LNCS, pages 553--571. Springer, 2007."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-003-0096-6"},{"key":"e_1_3_2_1_18_1","unstructured":"D. E. Knuth. In The Art of Computer Programming volume 3 pages 575--576 1973. D. E. Knuth. In The Art of Computer Programming volume 3 pages 575--576 1973."},{"key":"e_1_3_2_1_19_1","volume-title":"Pseudo-randomness and applications","author":"Luby M.","year":"1996","unstructured":"M. Luby . In Pseudo-randomness and applications . Princeton University Press , 1996 . M. Luby. In Pseudo-randomness and applications. Princeton University Press, 1996."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.259647"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796482"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796378"},{"key":"e_1_3_2_1_23_1","first-page":"918","volume-title":"Mathematics of Computation","volume":"32","author":"Pollard J.","year":"1978","unstructured":"J. Pollard . Monte carlo methods for index computations (mod p . In Mathematics of Computation , volume 32 , pages 918 --- 924 , 1978 . J. Pollard. Monte carlo methods for index computations (mod p. In Mathematics of Computation, volume 32, pages 918---924, 1978."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1494"},{"key":"e_1_3_2_1_25_1","volume-title":"A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants","author":"Shacham H.","year":"2007","unstructured":"H. Shacham . A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants . 2007 . H. Shacham. A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants. 2007."},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-68339-9_17","volume-title":"Advances in Cryptology -- EUROCRYPT'96","author":"Stadler M.","year":"1996","unstructured":"M. Stadler . Publicly verifiable secret sharing . In Advances in Cryptology -- EUROCRYPT'96 , volume 1070 of LNCS , pages 190 -- 199 . Springer , 1996 . M. Stadler. Publicly verifiable secret sharing. In Advances in Cryptology -- EUROCRYPT'96, volume 1070 of LNCS, pages 190--199. Springer, 1996."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1968.1972"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '09"},"container-title":["Proceedings of the 16th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1653662.1653677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T08:53:18Z","timestamp":1673513598000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653677"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,9]]},"references-count":28,"alternative-id":["10.1145\/1653662.1653677","10.1145\/1653662"],"URL":"https:\/\/doi.org\/10.1145\/1653662.1653677","relation":{},"subject":[],"published":{"date-parts":[[2009,11,9]]},"assertion":[{"value":"2009-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}