Query-Complexity Amplification for Random Oracles

被引:3
作者
Demay, Gregory [1 ]
Gazi, Peter [2 ]
Maurer, Ueli [1 ]
Tackmann, Bjoern [3 ,4 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[2] IST Austria, Klosterneuburg, Austria
[3] Univ Calif San Diego, Comp Sci & Engn, San Diego, CA 92103 USA
[4] Swiss Fed Inst Technol, Zurich, Switzerland
来源
INFORMATION THEORETIC SECURITY (ICITS 2015) | 2015年 / 9063卷
关键词
hash functions; random oracle; indifferentiability; moderately hard functions; SECURITY; INDISTINGUISHABILITY; INDIFFERENTIABILITY; HASH;
D O I
10.1007/978-3-319-17470-9_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Increasing the computational complexity of evaluating a hash function, both for the honest users as well as for an adversary, is a useful technique employed for example in password-based cryptographic schemes to impede brute-force attacks, and also in so-called proofs of work (used in protocols like Bitcoin) to show that a certain amount of computation was performed by a legitimate user. A natural approach to adjust the complexity of a hash function is to iterate it c times, for some parameter c, in the hope that any query to the scheme requires c evaluations of the underlying hash function. However, results by Dodis et al. (Crypto 2012) imply that plain iteration falls short of achieving this goal, and designing schemes which provably have such a desirable property remained an open problem. This paper formalizes explicitly what it means for a given scheme to amplify the query complexity of a hash function. In the random oracle model, the goal of a secure query-complexity amplifier (QCA) scheme is captured as transforming, in the sense of indifferentiability, a random oracle allowing R queries (for the adversary) into one provably allowing only r < R queries. Turned around, this means that making r queries to the scheme requires at least R queries to the actual random oracle. Second, a new scheme, called collision-free iteration, is proposed and proven to achieve c-fold QCA for both the honest parties and the adversary, for any fixed parameter c.
引用
收藏
页码:159 / 180
页数:22
相关论文
共 50 条
  • [21] Secure universal designated verifier signature without random oracles
    Xinyi Huang
    Willy Susilo
    Yi Mu
    Wei Wu
    International Journal of Information Security, 2008, 7 : 171 - 183
  • [22] Compact public key encryption without full random oracles
    Yoneyama, Kazuki
    Hanaoka, Goichiro
    PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 286 - 299
  • [23] Secure universal designated verifier signature without random oracles
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Wu, Wei
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (03) : 171 - 183
  • [24] New Constructions of Equality Test Scheme Without Random Oracles
    Zhu, Huijun
    Ahmad, Haseeb
    Xue, Qingji
    Li, Tianfeng
    Liu, Ziyu
    Liu, Ao
    IEEE ACCESS, 2023, 11 (49519-49529) : 49519 - 49529
  • [25] Collapse-Binding Quantum Commitments Without Random Oracles
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 166 - 195
  • [26] Public Immunization Against Complete Subversion Without Random Oracles
    Ateniese, Giuseppe
    Francati, Danilo
    Magri, Bernardo
    Venturi, Daniele
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 465 - 485
  • [27] Subversion-Resilient Authenticated Encryption Without Random Oracles
    Bemmann, Pascal
    Berndt, Sebastian
    Diemert, Denis
    Eisenbarth, Thomas
    Jager, Tibor
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 460 - 483
  • [28] Universal Designated Multi Verifier Signature Scheme without Random Oracles
    MING Yang1
    2. State Key Laboratory of Integrated Service Network
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 685 - 691
  • [29] An Efficient Certificate-Based Encryption Scheme Without Random Oracles
    Guo, Lan
    Lu, Yang
    Miao, Qing
    Zu, Guangao
    Wang, Zhongqi
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 97 - 107
  • [30] Practical Hierarchical Identity Based Encryption Scheme without Random Oracles
    Hu, Xiaoming
    Huang, Shangteng
    Fan, Xun
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (06) : 1494 - 1499