Universal Hash Functions & Hard Core Bits
نویسنده
چکیده
In this paper we consider the bit-security of two types of universal hash functions: linear functions on GFF2 n ] and linear functions on the integers modulo a prime. We show individual security for all bits in the rst case and for the O(log n) least signiicant bits in the second case. Both types of functions are shown to have O(log n) simultaneous secure bits. For the second type of functions, primes of length (n) are needed. Together with the Goldreich-Levin theorem, this shows that all the common types of universal hash functions provide so called hard-core bits.
منابع مشابه
A Primitive for Proving the Security of EveryBit and About Universal Hash Functions & Hard Core
Bit and About Universal Hash Functions & Hard Core Bits Eike Kiltz Lehrstuhl Mathematik & Informatik, Fakult at f ur Mathematik, Ruhr-Universit at Bochum, 44780 Bochum, Germany. Fax:+49-234-3214465 [email protected] Abstract. We present a useful primitive, the hidden number problem, which can be exploited to prove that every bit is a hard core of speci c cryptographic functions. A...
متن کاملA Primitive for Proving the Security of Every Bit andAbout Universal Hash Functions & Hard CorePredicates ?
In 1999, J. H astad and M. NN aslund 13] could prove that every bit is a hard core of the RSA function. From this work we extract an abstract theorem about the hidden number problem which can be used to prove that every bit is a hard core of many speciic cryptographic functions. Applications are RSA, ElGamal, Rabin, a modiied Diie-Hellman function, Pailler's cryptosystem, the Diie-Hellman funct...
متن کاملBit Extraction, Hard-Core Predicates, and the Bit Security of RSA
This thesis presents results on bit security and bit extraction. 1. A function b(·) is called secure or a hard-core function for a given function f(·), if for all probabilistic polynomial time algorithms, the information f(x) does not significantly aid in distinguishing b(x) from a random string of the same length. The benefit of studying hard-core functions is that they provide insight to the ...
متن کاملHigher Order Universal One-Way Hash Functions from the Subset Sum Assumption
Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damg̊ard domain extender. However, they did not provide any provably secure constructions f...
متن کاملBucket Hashing with a Small Key Size
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently, authentication codes. We show how it is possible to modify some known families of hash functions into a form such that the evaluation is similar to \bucket hashing", a technique for very fast hashing introduced by Rogaway. Rogaway's bucket hash family has a huge key size, which for common param...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995