Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions
نویسندگان
چکیده
In this work we give the first non-adaptive construction of universal one-way hash functions (UOWHFs) from arbitrary functions. Our uses $$O(n^9)$$ calls to function, has a key length $$O(n^{10})$$ , and can be implemented in NC1 assuming underlying function is NC1. Prior work, best UOWHF used $$O(n^{13})$$ adaptive size $$O(n^5)$$ (Haitner, Holenstein, Reingold, Vadhan Wee [Eurocrypt ’10]). By result Applebaum, Ishai Kushilevitz [FOCS ’04], above implies existence UOWHFs NC0, given We also show that PRG Haitner, Reingold (HRV, [STOC ’10]), with small modifications, yields relaxed notion UOWHFs, which family (inefficiently) converted by changing on negligible fraction inputs. order analyze construction, introduce next-bit unreachable entropy, replaces pseudoentropy HRV.
منابع مشابه
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
A fundamental result in cryptography is that a digital signature scheme can be constructed from an arbitrary one-way function. A proof of this somewhat surprising statement follows from two results: first, Naor and Yung defined the notion of universal one-way hash functions and showed that the existence of such hash functions implies the existence of secure digital signature schemes. Subsequent...
متن کاملHigher Order Universal One-Way Hash Functions
Universal One-Way Hash Functions (UOWHFs) are families of cryptographic hash functions for which first a target input is chosen and subsequently a key which selects a member from the family. Their main security property is that it should be hard to find a second input that collides with the target input. This paper generalizes the concept of UOWHFs to UOWHFs of order r. We demonstrate that it i...
متن کاملUniversal One-Way Hash Functions via Inaccessible Entropy
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs, which also obtains better efficiency and security. The construction exploits a strong connection to the recently introduced notion of inaccessible entropy (Haitner et al. STOC 2009). With this perspective, we observe tha...
متن کاملA Composition Theorem for Universal One-Way Hash Functions
In this paper we present a new scheme for constructing universal one-way hash functions that hash arbitrarily long messages out of universal one-way hash functions that hash fixed-length messages. The new construction is extremely simple and is also very efficient, yielding shorter keys than previously proposed composition constructions.
متن کاملOne-Way Hash Functions With Changeable Parameters
In this paper, four new algorithms for improvements of MD5 and SHA-Keyed/Unkeyed MD5 and Keyed/Unkeyed SHA are proposed. We change the mode of ®xed retrieval of the parameters to that of dynamic retrieval of the parameters by applying a mapping between the index phrase and the parameter table. As shown in the experimental result, with 1% degradation of performance, comparing to the original alg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2023
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-30634-1_17