Universal One-Way Hash Functions via Inaccessible Entropy

被引:0
|
作者
Haitner, Iftach
Holenstein, Thomas
Reingold, Omer
Vadhan, Salil
Wee, Hoeteck
机构
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010 | 2010年 / 6110卷
关键词
computational complexity; cryptography; hashing; target collision-resistance; one-way functions;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs, which also obtains better efficiency and security. The construction exploits a strong connection to the recently introduced notion of inaccessible entropy (Haitner et al. STOC 2009). With this perspective, we observe that a small tweak of any one-way function f is already a weak form of a UOWHF: Consider F(x, i) that outputs the i-bit long prefix of f(x). If F were a UOWHF then given a random a; and i it would be hard to come up with x' not equal x such that F(x, i) = F(x', i). While this may not be the case, we show (rather easily) that it is hard to sample x' with almost full entropy among all the possible such values of x'. The rest of our construction simply amplifies and exploits this basic property. With this and other recent works, we have that the constructions of three fundamental cryptographic primitives (Pseudorandom Generators, Statistically Hiding Commitments and UOWHFs) out of one-way functions are to a large extent unified. In particular, all three constructions rely on and manipulate computational notions of entropy in similar ways. Pseudorandom Generators rely on the well-established notion of pseudoentropy, whereas Statistically Hiding Commitments and UOWHEs rely on the newer notion of inaccessible entropy.
引用
收藏
页码:616 / 637
页数:22
相关论文
共 50 条
  • [21] A Fast and Secure One-Way Hash Function
    El Bakrawy, Lamiaa M.
    Ghali, Neveen I.
    Hassanien, Aboul Ella
    Kim, Tai-Hoon
    SECURITY TECHNOLOGY, 2011, 259 : 85 - +
  • [22] Efficient constructions for one-way hash chains
    Hu, YC
    Jakobsson, M
    Perrig, A
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 423 - 441
  • [23] A new strong-password authentication scheme using one-way hash functions
    Lin, C. -W.
    Tsai, C. -S.
    Hwang, M. -S.
    JOURNAL OF COMPUTER AND SYSTEMS SCIENCES INTERNATIONAL, 2006, 45 (04) : 623 - 626
  • [24] A new strong-password authentication scheme using one-way hash functions
    C. -W. Lin
    C. -S. Tsai
    M. -S. Hwang
    Journal of Computer and Systems Sciences International, 2006, 45 : 623 - 626
  • [25] Study on a signature scheme without using one-way hash functions or message redundancy
    Yu, Baozheng
    Xu, Congwei
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 41 - +
  • [26] Hierarchical key establishment protocols based on secure keyed one-way hash functions
    Ku, WC
    Wang, SD
    TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 162 - 167
  • [27] A novel suite of tests for evaluating one-way hash functions for electronic commerce applications
    Karras, DA
    Zorkadis, V
    PROCEEDINGS OF THE 26TH EUROMICRO CONFERENCE, VOLS I AND II, 2000, : A464 - A468
  • [28] On continuous one-way functions
    Ko, Ker-, I
    Wu, Lidong
    THEORETICAL COMPUTER SCIENCE, 2021, 852 : 1 - 17
  • [29] Semigroups and one-way functions
    Birget, J. C.
    INTERNATIONAL JOURNAL OF ALGEBRA AND COMPUTATION, 2015, 25 (1-2) : 3 - 36
  • [30] On complete one-way functions
    A. A. Kozhevnikov
    S. I. Nikolenko
    Problems of Information Transmission, 2009, 45 : 168 - 183