Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions

نویسندگان

چکیده

In this work we give the first non-adaptive construction of universal one-way hash functions (UOWHFs) from arbitrary functions. Our uses $$O(n^9)$$ calls to function, has a key length $$O(n^{10})$$ , and can be implemented in NC1 assuming underlying function is NC1. Prior work, best UOWHF used $$O(n^{13})$$ adaptive size $$O(n^5)$$ (Haitner, Holenstein, Reingold, Vadhan Wee [Eurocrypt ’10]). By result Applebaum, Ishai Kushilevitz [FOCS ’04], above implies existence UOWHFs NC0, given We also show that PRG Haitner, Reingold (HRV, [STOC ’10]), with small modifications, yields relaxed notion UOWHFs, which family (inefficiently) converted by changing on negligible fraction inputs. order analyze construction, introduce next-bit unreachable entropy, replaces pseudoentropy HRV.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions

A fundamental result in cryptography is that a digital signature scheme can be constructed from an arbitrary one-way function. A proof of this somewhat surprising statement follows from two results: first, Naor and Yung defined the notion of universal one-way hash functions and showed that the existence of such hash functions implies the existence of secure digital signature schemes. Subsequent...

متن کامل

Higher Order Universal One-Way Hash Functions

Universal One-Way Hash Functions (UOWHFs) are families of cryptographic hash functions for which first a target input is chosen and subsequently a key which selects a member from the family. Their main security property is that it should be hard to find a second input that collides with the target input. This paper generalizes the concept of UOWHFs to UOWHFs of order r. We demonstrate that it i...

متن کامل

Universal One-Way Hash Functions via Inaccessible Entropy

This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs, which also obtains better efficiency and security. The construction exploits a strong connection to the recently introduced notion of inaccessible entropy (Haitner et al. STOC 2009). With this perspective, we observe tha...

متن کامل

A Composition Theorem for Universal One-Way Hash Functions

In this paper we present a new scheme for constructing universal one-way hash functions that hash arbitrarily long messages out of universal one-way hash functions that hash fixed-length messages. The new construction is extremely simple and is also very efficient, yielding shorter keys than previously proposed composition constructions.

متن کامل

One-Way Hash Functions With Changeable Parameters

In this paper, four new algorithms for improvements of MD5 and SHA-Keyed/Unkeyed MD5 and Keyed/Unkeyed SHA are proposed. We change the mode of ®xed retrieval of the parameters to that of dynamic retrieval of the parameters by applying a mapping between the index phrase and the parameter table. As shown in the experimental result, with 1% degradation of performance, comparing to the original alg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-30634-1_17