From: Predicate encryption against master-key tampering attacks
Primitives | TRF description | Reference | Assumption | Tampering times | Tampering function |
---|---|---|---|---|---|
(c)NM-KDF | H(x)=f(x) | - | One-Time | Bounded-degree polynomial | |
\(f: \mathcal {X} \rightarrow \mathcal {Y}\) | |||||
DDH | Continual | Bounded-degree polynomial | |||
TR-PRF | H(x)=fx(c) | DDH | Continual | Group-induced function | |
\(f: \mathcal {K} \times \mathcal {X} \rightarrow \mathcal {Y}\) | where \(c \leftarrow \mathcal {X}\) is public | ||||
DLIN | Continual | Group-induced function | |||
CISH | H(x)=fk(x) | q-DHI | Continual | Bounded-degree polynomial | |
\(f: \mathcal {K} \times \mathcal {X} \rightarrow \mathcal {Y}\) | where \(k \leftarrow \mathcal {K}\) is public |