hash functions hash functions
play

Hash Functions Hash Functions Lecture 10 Hash Functions Lecture - PowerPoint PPT Presentation

Hash Functions Hash Functions Lecture 10 Hash Functions Lecture 10 Before we talk about digital signatures... A Tale of Two Boxes A Tale of Two Boxes Much of today s applied cryptography works with two magic boxes A Tale of Two Boxes


  1. Degrees of Collision-Resistance If for all PPT A, Pr[x ≠ y and h(x)=h(y)] is negligible in the following experiment: A → (x,y); h ← H : Combinatorial Hash Functions (even non-PPT A) A → x; h ← H ; A(h) → y : Universal One-Way Hash Functions h ← H ; A(h) → (x,y) : Collision-Resistant Hash Functions Also useful sometimes: A gets only oracle access to h(.) (weak). Or, A gets any coins used for sampling h (strong).

  2. Degrees of Collision-Resistance If for all PPT A, Pr[x ≠ y and h(x)=h(y)] is negligible in the following experiment: A → (x,y); h ← H : Combinatorial Hash Functions (even non-PPT A) A → x; h ← H ; A(h) → y : Universal One-Way Hash Functions h ← H ; A(h) → (x,y) : Collision-Resistant Hash Functions Also useful sometimes: A gets only oracle access to h(.) (weak). Or, A gets any coins used for sampling h (strong). CRHF the strongest; UOWHF still powerful (will be enough for digital signatures)

  3. Degrees of Collision-Resistance

  4. Degrees of Collision-Resistance Weaker variants of CRHF/UOWHF (where x is random)

  5. Degrees of Collision-Resistance Weaker variants of CRHF/UOWHF (where x is random) h ← H ; x ← X; A(h,h(x)) → y (y=x allowed)

  6. Degrees of Collision-Resistance Weaker variants of CRHF/UOWHF (where x is random) h ← H ; x ← X; A(h,h(x)) → y (y=x allowed) Pre-image collision resistance if h(x)=h(y) w.n.p

  7. Degrees of Collision-Resistance Weaker variants of CRHF/UOWHF (where x is random) h ← H ; x ← X; A(h,h(x)) → y (y=x allowed) Pre-image collision resistance if h(x)=h(y) w.n.p i.e., f(h,x) := (h,h(x)) is a OWF (and h compresses)

  8. Degrees of Collision-Resistance Weaker variants of CRHF/UOWHF (where x is random) Way Hash Function A.k.a One- h ← H ; x ← X; A(h,h(x)) → y (y=x allowed) Pre-image collision resistance if h(x)=h(y) w.n.p i.e., f(h,x) := (h,h(x)) is a OWF (and h compresses)

  9. Degrees of Collision-Resistance Weaker variants of CRHF/UOWHF (where x is random) Way Hash Function A.k.a One- h ← H ; x ← X; A(h,h(x)) → y (y=x allowed) Pre-image collision resistance if h(x)=h(y) w.n.p i.e., f(h,x) := (h,h(x)) is a OWF (and h compresses) h ← H ; x ← X; A(h,x) → y (y ≠ x)

  10. Degrees of Collision-Resistance Weaker variants of CRHF/UOWHF (where x is random) Way Hash Function A.k.a One- h ← H ; x ← X; A(h,h(x)) → y (y=x allowed) Pre-image collision resistance if h(x)=h(y) w.n.p i.e., f(h,x) := (h,h(x)) is a OWF (and h compresses) h ← H ; x ← X; A(h,x) → y (y ≠ x) Second Pre-image collision resistance if h(x)=h(y) w.n.p

  11. Degrees of Collision-Resistance Weaker variants of CRHF/UOWHF (where x is random) Way Hash Function A.k.a One- h ← H ; x ← X; A(h,h(x)) → y (y=x allowed) Pre-image collision resistance if h(x)=h(y) w.n.p i.e., f(h,x) := (h,h(x)) is a OWF (and h compresses) h ← H ; x ← X; A(h,x) → y (y ≠ x) Second Pre-image collision resistance if h(x)=h(y) w.n.p Incomparable (neither implies the other) [Exercise]

  12. Degrees of Collision-Resistance Weaker variants of CRHF/UOWHF (where x is random) Way Hash Function A.k.a One- h ← H ; x ← X; A(h,h(x)) → y (y=x allowed) Pre-image collision resistance if h(x)=h(y) w.n.p i.e., f(h,x) := (h,h(x)) is a OWF (and h compresses) h ← H ; x ← X; A(h,x) → y (y ≠ x) Second Pre-image collision resistance if h(x)=h(y) w.n.p Incomparable (neither implies the other) [Exercise] CRHF implies second pre-image collision resistance and, if sufficiently compressing, then pre-image collision resistance [Exercise]

  13. Hash Length

  14. Hash Length If range of the hash function is too small, not collision-resistant

  15. Hash Length If range of the hash function is too small, not collision-resistant If range poly-size (i.e. hash log-long), then non-negligible probability that two random x, y provide collision

  16. Hash Length If range of the hash function is too small, not collision-resistant If range poly-size (i.e. hash log-long), then non-negligible probability that two random x, y provide collision In practice interested in minimizing the hash length (for efficiency)

  17. Hash Length If range of the hash function is too small, not collision-resistant If range poly-size (i.e. hash log-long), then non-negligible probability that two random x, y provide collision In practice interested in minimizing the hash length (for efficiency) Generic collision-finding attack: birthday attack

  18. Hash Length If range of the hash function is too small, not collision-resistant If range poly-size (i.e. hash log-long), then non-negligible probability that two random x, y provide collision In practice interested in minimizing the hash length (for efficiency) Generic collision-finding attack: birthday attack Look for a collision in a set of random hashes (needs only oracle access to the hash function)

  19. Hash Length If range of the hash function is too small, not collision-resistant If range poly-size (i.e. hash log-long), then non-negligible probability that two random x, y provide collision In practice interested in minimizing the hash length (for efficiency) Generic collision-finding attack: birthday attack Look for a collision in a set of random hashes (needs only oracle access to the hash function) Expected size of the set before collision: O( √ |range|)

  20. Hash Length If range of the hash function is too small, not collision-resistant If range poly-size (i.e. hash log-long), then non-negligible probability that two random x, y provide collision In practice interested in minimizing the hash length (for efficiency) Generic collision-finding attack: birthday attack Look for a collision in a set of random hashes (needs only oracle access to the hash function) Expected size of the set before collision: O( √ |range|) Birthday attack effectively halves the hash length (say security parameter) over “naïve attack”

  21. Universal Hashing

  22. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p

  23. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p Even better: 2-Universal Hash Functions

  24. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p Even better: 2-Universal Hash Functions “Uniform” and “Pairwise-independent”

  25. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p Even better: 2-Universal Hash Functions “Uniform” and “Pairwise-independent” ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z)

  26. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1

  27. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2

  28. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z|

  29. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range

  30. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if k-Universal: super-polynomial-sized range

  31. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if k-Universal: super-polynomial-sized range ∀ x 1 ..x k (distinct), z 1 ..z k , Pr h ← H [ ∀ i h(x i )=z i ] = 1/|Z| k

  32. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if k-Universal: super-polynomial-sized range ∀ x 1 ..x k (distinct), z 1 ..z k , Pr h ← H [ ∀ i h(x i )=z i ] = 1/|Z| k Inefficient example: H set of all functions from X to Z

  33. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if k-Universal: super-polynomial-sized range ∀ x 1 ..x k (distinct), z 1 ..z k , Pr h ← H [ ∀ i h(x i )=z i ] = 1/|Z| k Inefficient example: H set of all functions from X to Z But we will need all h ∈ H to be succinctly described and efficiently evaluable

  34. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range

  35. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range e.g. h a,b (x) = ax+b (in a finite field, X=Z)

  36. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range e.g. h a,b (x) = ax+b (in a finite field, X=Z) Pr a,b [ ax+b = z ] = Pr a,b [ b = z-ax ] = 1/|Z|

  37. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range e.g. h a,b (x) = ax+b (in a finite field, X=Z) Pr a,b [ ax+b = z ] = Pr a,b [ b = z-ax ] = 1/|Z| Pr a,b [ ax+b = w, ay+b = z] = ? Exactly one (a,b) satisfying the two equations (for x ≠ y)

  38. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range e.g. h a,b (x) = ax+b (in a finite field, X=Z) Pr a,b [ ax+b = z ] = Pr a,b [ b = z-ax ] = 1/|Z| Pr a,b [ ax+b = w, ay+b = z] = ? Exactly one (a,b) satisfying the two equations (for x ≠ y) Pr a,b [ ax+b = w, ay+b = z] = 1/|Z| 2

  39. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range e.g. h a,b (x) = ax+b (in a finite field, X=Z) Pr a,b [ ax+b = z ] = Pr a,b [ b = z-ax ] = 1/|Z| Pr a,b [ ax+b = w, ay+b = z] = ? Exactly one (a,b) satisfying the two equations (for x ≠ y) Pr a,b [ ax+b = w, ay+b = z] = 1/|Z| 2 But does not compress!

  40. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range

  41. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range e.g. h’ h (x) = Chop(h(x)) where h from a 
 (possibly non-compressing) 2-universal HF

  42. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range e.g. h’ h (x) = Chop(h(x)) where h from a 
 (possibly non-compressing) 2-universal HF Chop a t-to-1 map from Z to Z’ (e.g. removes last bit: 2-to-1)

  43. Universal Hashing Combinatorial HF: A → (x,y); h ← H . h(x)=h(y) w.n.p x h h h h Even better: 2-Universal Hash Functions 0 0 0 1 1 “Uniform” and “Pairwise-independent” 1 0 1 0 1 ∀ x,z Pr h ← H [ h(x)=z ] = 1/|Z| (where h:X → Z) 2 1 0 0 1 ∀ x ≠ y,w,z Pr h ← H [ h(x)=w, h(y)=z ] = 1/|Z| 2 ⇒ ∀ x ≠ y Pr h ← H [ h(x)=h(y) ] = 1/|Z| Negligible collision-probability if super-polynomial-sized range e.g. h’ h (x) = Chop(h(x)) where h from a 
 (possibly non-compressing) 2-universal HF Chop a t-to-1 map from Z to Z’ (e.g. removes last bit: 2-to-1) Pr h [ Chop(h(x)) = w, Chop(h(y)) = z] 
 = Pr h [ h(x) = w0 or w1, h(y) = z0 or z1] = 4/|Z| 2 = 1/|Z’| 2

  44. UOWHF

  45. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p

  46. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p Can be constructed from OWF

  47. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p Can be constructed from OWF Easier to see OWP ⇒ UOWHF

  48. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p Can be constructed from OWF Easier to see OWP ⇒ UOWHF F h (x) = h(f(x)), where f is a OWP and h from a UHF family

  49. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p Can be constructed from OWF Easier to see OWP ⇒ UOWHF F h (x) = h(f(x)), where f is a OWP and h from a UHF family suppose h compresses by a bit (i.e., 2-to-1 maps), and

  50. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p Can be constructed from OWF Easier to see OWP ⇒ UOWHF F h (x) = h(f(x)), where f is a OWP and h from a UHF family suppose h compresses by a bit (i.e., 2-to-1 maps), and for all z,z’, can sample (solve for) h s.t. h(z) = h(z’)

  51. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p Can be constructed from OWF Easier to see OWP ⇒ UOWHF F h (x) = h(f(x)), where f is a OWP and h from a UHF family suppose h compresses by a bit (i.e., 2-to-1 maps), and for all z,z’, can sample (solve for) h s.t. h(z) = h(z’) Is a UOWHF [Why?]

  52. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p Can be constructed from OWF Easier to see OWP ⇒ UOWHF F h (x) = h(f(x)), where f is a OWP and h from a UHF family suppose h compresses by a bit (i.e., 2-to-1 maps), and for all z,z’, can sample (solve for) h s.t. h(z) = h(z’) BreakOWP(z) { get x ← A; give h to A, s.t. h(z)=h(f(x)); 
 Is a UOWHF [Why?] if A → y s.t. h(f(x)) = h(f(y)), output y; }

  53. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p Can be constructed from OWF Easier to see OWP ⇒ UOWHF F h (x) = h(f(x)), where f is a OWP and h from a UHF family suppose h compresses by a bit (i.e., 2-to-1 maps), and for all z,z’, can sample (solve for) h s.t. h(z) = h(z’) BreakOWP(z) { get x ← A; give h to A, s.t. h(z)=h(f(x)); 
 Is a UOWHF [Why?] if A → y s.t. h(f(x)) = h(f(y)), output y; } Gives a UOWHF that compresses by 1 bit (same as the UHF)

  54. UOWHF Universal One-Way HF: A → x; h ← H ; A(h) → y. h(x)=h(y) w.n.p Can be constructed from OWF Easier to see OWP ⇒ UOWHF F h (x) = h(f(x)), where f is a OWP and h from a UHF family suppose h compresses by a bit (i.e., 2-to-1 maps), and for all z,z’, can sample (solve for) h s.t. h(z) = h(z’) BreakOWP(z) { get x ← A; give h to A, s.t. h(z)=h(f(x)); 
 Is a UOWHF [Why?] if A → y s.t. h(f(x)) = h(f(y)), output y; } Gives a UOWHF that compresses by 1 bit (same as the UHF) Will see next, how to extend the domain to arbitrarily long strings (without increasing output size)

  55. CRHF

  56. CRHF Collision-Resistant HF: h ← H ; A(h) → (x,y). h(x)=h(y) w.n.p

  57. CRHF Collision-Resistant HF: h ← H ; A(h) → (x,y). h(x)=h(y) w.n.p Not known to be possible from OWF/OWP alone

Recommend


More recommend