SL2 homomorphic hash functions: worst case to average case reduction and short collision search

نویسندگان

  • Ciaran Mullan
  • Boaz Tsaban
چکیده

We study homomorphic hash functions into SL2(q), the 2 × 2 matrices with determinant 1 over the field with q elements. Modulo a well supported number theoretic hypothesis, which holds in particular for all concrete homomorphisms proposed thus far, we prove that a random homomorphism is at least as secure as any concrete homomorphism. For a family of homomorphisms containing several concrete proposals in the literature, we prove that collisions of length O(log q) can be found in running time O( √ q). For general homomorphisms we offer an algorithm that, heuristically and according to experiments, in running time O( √ q) finds collisions of length O(log q) for q even, and length O(logq/ log log q) for arbitrary q. For any conceivable practical scenario, our algorithms are substantially faster than all earlier algorithms and produce much shorter collisions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Short collision search in arbitrary SL2 homomorphic hash functions

We study homomorphic hash functions into SL2(q), the 2 × 2 matrices with determinant 1 over the field with q elements. Modulo a well supported number theoretic hypothesis, which holds in particular for all concrete homomorphisms proposed thus far, we prove that a random homomorphism is at least as secure as any concrete homomorphism. For a family of homomorphisms containing several concrete pro...

متن کامل

Additively Homomorphic Encryption with d-Operand Multiplications

The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rivest, Adleman and Dertouzos in 1978. In this work we define a theoretical object, chained encryption schemes, which allow an efficient evaluation of polynomials of degree d over encrypted data. Chained encryption scheme...

متن کامل

Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems

In lattice cryptography, worst-case to average-case reductions rely on two problems: Ajtai’s SIS and Regev’s LWE, which both refer to a very small class of random lattices related to the group G = Zq . We generalize worst-case to average-case reductions to all integer lattices of sufficiently large determinant, by allowing G to be any (sufficiently large) finite abelian group. In particular, we...

متن کامل

Generalized Compact Knapsacks Are Collision Resistant

The generalized knapsack problem is the following: given m random elements a1, . . . , am in a ring R, and a target t ∈ R, find z1, . . . , zm ∈ D such that P aizi = t, where D is some fixed subset of R. In (Micciancio, FOCS 2002) it was proved that for appropriate choices of R and D, solving the generalized compact knapsack problem on the average is as hard as solving certain worst-case proble...

متن کامل

On Hash - Coding Algorithms

We examine the efficiency of generalized hash-coding algorithms for performing partial-match searches of a random--access file of binary words. A precise charac­ terization is given of those hash functions which minimize the average number of buckets examined for a search ; and a new class of combinatorial designs is introduced which permits the construction of hash functions with worst-case be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 81  شماره 

صفحات  -

تاریخ انتشار 2016