Query-Complexity Amplification for Random Oracles

被引:3
作者
Demay, Gregory [1 ]
Gazi, Peter [2 ]
Maurer, Ueli [1 ]
Tackmann, Bjoern [3 ,4 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[2] IST Austria, Klosterneuburg, Austria
[3] Univ Calif San Diego, Comp Sci & Engn, San Diego, CA 92103 USA
[4] Swiss Fed Inst Technol, Zurich, Switzerland
来源
INFORMATION THEORETIC SECURITY (ICITS 2015) | 2015年 / 9063卷
关键词
hash functions; random oracle; indifferentiability; moderately hard functions; SECURITY; INDISTINGUISHABILITY; INDIFFERENTIABILITY; HASH;
D O I
10.1007/978-3-319-17470-9_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Increasing the computational complexity of evaluating a hash function, both for the honest users as well as for an adversary, is a useful technique employed for example in password-based cryptographic schemes to impede brute-force attacks, and also in so-called proofs of work (used in protocols like Bitcoin) to show that a certain amount of computation was performed by a legitimate user. A natural approach to adjust the complexity of a hash function is to iterate it c times, for some parameter c, in the hope that any query to the scheme requires c evaluations of the underlying hash function. However, results by Dodis et al. (Crypto 2012) imply that plain iteration falls short of achieving this goal, and designing schemes which provably have such a desirable property remained an open problem. This paper formalizes explicitly what it means for a given scheme to amplify the query complexity of a hash function. In the random oracle model, the goal of a secure query-complexity amplifier (QCA) scheme is captured as transforming, in the sense of indifferentiability, a random oracle allowing R queries (for the adversary) into one provably allowing only r < R queries. Turned around, this means that making r queries to the scheme requires at least R queries to the actual random oracle. Second, a new scheme, called collision-free iteration, is proposed and proven to achieve c-fold QCA for both the honest parties and the adversary, for any fixed parameter c.
引用
收藏
页码:159 / 180
页数:22
相关论文
共 50 条
  • [41] SignORKE: improving pairing-based one-round key exchange without random oracles
    Yang, Zheng
    Lai, Junyu
    Liu, Wanping
    Liu, Chao
    Luo, Song
    [J]. IET INFORMATION SECURITY, 2017, 11 (05) : 243 - 249
  • [42] An ID-based online/offline signature scheme without random oracles for wireless sensor networks
    Wang, Zhiwei
    Chen, Wei
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 837 - 841
  • [43] CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
    Weng Jian
    Chen MinRong
    Yang YanJiang
    Deng, Robert
    Chen Kefei
    Bao Feng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 593 - 606
  • [44] Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles
    Barbosa, Manuel
    Farshim, Pooya
    [J]. INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 145 - +
  • [45] Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity
    Belaid, Sonia
    Rivain, Matthieu
    Taleb, Abdul Rahman
    Vergnaud, Damien
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 157 - 188
  • [46] Cryptanalysis of Zhu et al.'s Identity-Based Encryption With Equality Test Without Random Oracles
    Lee, Hyung Tae
    [J]. IEEE ACCESS, 2023, 11 : 84533 - 84542
  • [47] Bounded truth table does not reduce the one-query tautologies to a random oracle
    Suzuki, T
    [J]. ARCHIVE FOR MATHEMATICAL LOGIC, 2005, 44 (06) : 751 - 762
  • [48] Bounded truth table does not reduce the one-query tautologies to a random oracle
    Toshio Suzuki
    [J]. Archive for Mathematical Logic, 2005, 44 : 751 - 762
  • [49] Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs
    Zhou, Yuan
    Qian, Haifeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (07) : 764 - 775
  • [50] Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles
    Barak, Boaz
    Mahmoody, Mohammad
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (03) : 699 - 734