Cryptographic Hash Functions from Expander Graphs

被引:195
作者
Charles, Denis X. [1 ]
Lauter, Kristin E. [1 ]
Goren, Eyal Z. [2 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] McGill Univ, Montreal, PQ H3A 2K6, Canada
基金
英国科研创新办公室;
关键词
Cryptographic hash functions; Expander graphs; Elliptic curve cryptography; Isogenies; Ramanujan graphs; Supersingular elliptic curves; SCHEME; SECURITY; SL(2); VSH;
D O I
10.1007/s00145-007-9002-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose constructing provable collision resistant hash functions from expander graphs in which finding cycles is hard. As examples, we investigate two specific families of optimal expander graphs for provable collision resistant hash function constructions: the families of Ramanujan graphs constructed by Lubotzky-Phillips-Sarnak and Pizer respectively. When the hash function is constructed from one of Pizer's Ramanujan graphs, (the set of supersingular elliptic curves over F(p)(2) with l-isogenies, l a prime different from p), then collision resistance follows from hardness of computing isogenies between supersingular elliptic curves. For the LPS graphs, the underlying hard problem is a representation problem in group theory. Constructing our hash functions from optimal expander graphs implies that the outputs closely approximate the uniform distribution. This property is useful for arguing that the output is indistinguishable from random sequences of bits. We estimate the cost per bit to compute these hash functions, and we implement our hash function for several members of the Pizer and LPS graph families and give actual timings.
引用
收藏
页码:93 / 113
页数:21
相关论文
共 27 条
[1]  
Abdukhalikov KS, 1998, LECT NOTES COMPUT SC, V1372, P93
[2]   EIGENVALUES AND EXPANDERS [J].
ALON, N .
COMBINATORICA, 1986, 6 (02) :83-96
[3]  
[Anonymous], 1986, GRADUATE TEXTS MATH
[4]  
[Anonymous], 1989, J. Amer. Math. Soc.
[5]  
BLAKE I, 1999, LOND MATH SOC LECT N, V265
[6]  
BOSTAN A, FAST ALGORITHMS COMP
[7]  
CERVINO JM, CORRESPONDENCE SUPER
[8]  
Charles D., 2005, LMS J COMPUT MATH, V8, P195, DOI 10.1112/S1461157000000954
[9]  
Charnes C, 1995, LECT NOTES COMPUT SC, V917, P322, DOI 10.1007/BFb0000444
[10]  
Contini S, 2006, LECT NOTES COMPUT SC, V4004, P165