Universal One-Way Hash Functions via Inaccessible Entropy

被引:0
作者
Haitner, Iftach
Holenstein, Thomas
Reingold, Omer
Vadhan, Salil
Wee, Hoeteck
机构
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010 | 2010年 / 6110卷
关键词
computational complexity; cryptography; hashing; target collision-resistance; one-way functions;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs, which also obtains better efficiency and security. The construction exploits a strong connection to the recently introduced notion of inaccessible entropy (Haitner et al. STOC 2009). With this perspective, we observe that a small tweak of any one-way function f is already a weak form of a UOWHF: Consider F(x, i) that outputs the i-bit long prefix of f(x). If F were a UOWHF then given a random a; and i it would be hard to come up with x' not equal x such that F(x, i) = F(x', i). While this may not be the case, we show (rather easily) that it is hard to sample x' with almost full entropy among all the possible such values of x'. The rest of our construction simply amplifies and exploits this basic property. With this and other recent works, we have that the constructions of three fundamental cryptographic primitives (Pseudorandom Generators, Statistically Hiding Commitments and UOWHFs) out of one-way functions are to a large extent unified. In particular, all three constructions rely on and manipulate computational notions of entropy in similar ways. Pseudorandom Generators rely on the well-established notion of pseudoentropy, whereas Statistically Hiding Commitments and UOWHEs rely on the newer notion of inaccessible entropy.
引用
收藏
页码:616 / 637
页数:22
相关论文
共 50 条
  • [31] Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
    Liu, Jian-Dong
    Fu, Xiu-Li
    Tongxin Xuebao/Journal on Communications, 2007, 28 (06): : 30 - 38
  • [32] Coin Flipping with Constant Bias Implies One-Way Functions
    Haitner, Iftach
    Omri, Eran
    2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011,
  • [33] One-Way Functions vs. TFNP: Simpler and Improved
    Folwarczny, Lukas
    Goos, Mika
    Hubacek, Pavel
    Maystre, Gilbert
    Yuan, Weiqiang
    15TH INNOVATIONS IN THEORETICAL COMPUTER SCIENCE CONFERENCE, ITCS 2024, 2024,
  • [34] One-Way Functions Using Algorithmic and Classical Information Theories
    Antunes, Luis
    Matos, Armando
    Pinto, Alexandre
    Souto, Andre
    Teixeira, Andreia
    THEORY OF COMPUTING SYSTEMS, 2013, 52 (01) : 162 - 178
  • [35] Constant-Round Arguments from One-Way Functions
    Amit, Noga
    Rothblum, Guy N.
    PROCEEDINGS OF THE 55TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2023, 2023, : 1537 - 1544
  • [36] COIN FLIPPING WITH CONSTANT BIAS IMPLIES ONE-WAY FUNCTIONS
    Haitner, Iftach
    Omri, Eran
    SIAM JOURNAL ON COMPUTING, 2014, 43 (02) : 389 - 409
  • [37] One-Way Functions Using Algorithmic and Classical Information Theories
    Luís Antunes
    Armando Matos
    Alexandre Pinto
    André Souto
    Andreia Teixeira
    Theory of Computing Systems, 2013, 52 : 162 - 178
  • [38] Adaptively Secure Garbled Circuits from One-Way Functions
    Hemenway, Brett
    Jafargholi, Zahra
    Ostrovsky, Rafail
    Scafuro, Alessandra
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 149 - 178
  • [39] Characterizing the existence of one-way permutations
    Hemaspaandra, LA
    Rothe, J
    THEORETICAL COMPUTER SCIENCE, 2000, 244 (1-2) : 257 - 261
  • [40] Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
    Komargodski, Ilan
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 139 - 158