Oblivious pseudorandom function: Difference between revisions

Content deleted Content added
m Sample OPRF Protocol: removed space from pseudocode
m Added link for quantum attacks
Line 70:
// Unblind the response to produce the result
ECPoint result = ECMultiply(serverResponse, iinverse);
 
// Hash the unblinded result to complete OPRF calculation
Line 104:
Because the elliptic curve point multiplication is computationally difficult to invert (like the [[discrete logarithm]] problem, the client cannot feasibly learn the server's secret from the response it produces.
 
Note, however, that this function is vulnerable to [[quantum_attackShor%27s_algorithm|attacks]] by [[quantum computers]]. A client or third party in possession of a quantum computer could solve for the server's secret knowing the result it produced for a given input.
 
==== RSA Blind Signatures ====