Multi-Collision Resistance: A Paradigm for Keyless Hash Functions

نویسندگان

  • Nir Bitansky
  • Yael Tauman Kalai
  • Omer Paneth
چکیده

We study the notion ofmulti-collision resistance of hash functions— a natural relaxation of collisionresistance that only guarantees the intractability of finding many (rather than two) inputs that map to the same image. An appealing feature of such hash functions is that unlike their collision-resistant counterparts, they do not necessarily require a key. Specifically, in the keyless setting, we only require that the size of collisions an adversarial algorithm can find is not much larger than its description size, or non-uniform advice. We show how to replace collision resistance with multi-collision resistance in several foundational applications. Relying on such keyless functions, we improve on the best known round complexity for these applications. This includes: • 3-message zero-knowledge arguments for NP. • 3-message succinct arguments of knowledge for NP. • 4-message ε-zero-knowledge proofs for NP. • 5-message public-coin zero-knowledge arguments for NP. These results are obtained in the standard model of non-uniform adversaries of arbitrary polynomial size. Our techniques can also be applied in the keyed setting, at the cost of adding another message. In this case, we relax the known complexity assumptions for the last three applications, while still matching the state of the art in terms of round complexity. The core technical contribution behind our results is a domain extension transformation from multicollision-resistant hash functions for a fixed input length to ones with an arbitrary input length and a local opening property. ∗MIT, email [email protected]. Supported by NSF Grants CNS-1350619 and CNS-1414119, and the Defense Advanced Research Projects Agency (DARPA) and the U.S. Army Research Office under contracts W911NF-15-C-0226 and W911NF-15-C-0236. †Microsoft Research, email [email protected]. ‡MIT, email [email protected] Supported byNSFGrants CNS-1350619 andCNS-1414119, and theDefenseAdvanced Research Projects Agency (DARPA) and the U.S. Army Research Office under contracts W911NF-15-C-0226 and W911NF-15-C-0236. ISSN 1433-8092 Electronic Colloquium on Computational Complexity, Revision 1 of Report No. 99 (2017)

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys

There is a foundational problem involving collision-resistant hash-functions: common constructions are keyless, but formal definitions are keyed. The discrepancy stems from the fact that a function H: {0, 1} → {0, 1} always admits an efficient collision-finding algorithm, it’s just that us human beings might be unable to write the program down. We explain a simple way to sidestep this difficult...

متن کامل

Three-Property Preserving Iterations of Keyless Compression Functions

Almost all hash functions are based on the Merkle-Damg̊ard iteration of a finite-domain compression function. It has been shown that this iteration preserves collision resistance, but it does not preserve other properties such as preimage or second preimage resistance. The recently proposed ROX construction provably preserves all seven security notions put forward by Rogaway and Shrimpton at FSE...

متن کامل

Design and Analysis of Multi-Block-Length Hash Functions

Cryptographic hash functions are used in many cryptographic applications, and the design of provably secure hash functions (relative to various security notions) is an active area of research. Most of the currently existing hash functions use the Merkle–Damgård paradigm, where by appropriate iteration the hash function inherits its collision and preimage resistance from the underlying compressi...

متن کامل

Multi-property Preserving Combiners for Hash Functions

A robust combiner for hash functions takes two candidate implementations and constructs a hash function which is secure as long as at least one of the candidates is secure. So far, hash function combiners only aim at preserving a single property such as collision-resistance or pseudorandomness. However, when hash functions are used in protocols like TLS they are often required to provide severa...

متن کامل

Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1

The design principle of Merkle-Damg̊ard construction is collision resistance of the compression function implies collision resistance of the hash function. Recently multi-block collisions have been found on the hash functions MD5, SHA-0 and SHA-1 using differential cryptanalysis. These multi-block collisions raise several questions on some definitions and properties used in the hash function lit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017