Collision Resistant Hashing from Learning Parity with Noise

نویسندگان

  • Yu Yu
  • Jiang Zhang
  • Jian Weng
  • Chun Guo
  • Xiangxue Li
چکیده

The Learning Parity with Noise (LPN) problem has recently found many cryptographic applications such as authentication protocols, pseudorandom generators/functions and even asymmetric tasks including public-key encryption (PKE) schemes and oblivious transfer (OT) protocols. It however remains a long-standing open problem whether LPN implies collision resistant hash (CRH) functions. Based on the recent work of Applebaum et al. (ITCS 2017), we introduce a general framework for constructing CRH from LPN for various parameter choices. We show that, just to mention a few notable ones, under any of the following hardness assumptions (for the two most common variants of LPN) 1. constant-noise LPN is 2 0.5+ε -hard for any constant ε > 0; 2. constant-noise LPN is 2 -hard given q = poly(n) samples; 3. low-noise LPN (of noise rate 1/ √ n) is 2 √ n/ -hard given q = poly(n) samples. there exists CRH functions with constant (or even poly-logarithmic) shrinkage, which can be implemented using polynomial-size depth-3 circuits with NOT, (unbounded fan-in) AND and XOR gates. Our technical route LPN→bSVP→CRH is reminiscent of the known reductions for the large-modulus analogue, i.e., LWE→SIS→CRH, where the binary Shortest Vector Problem (bSVP) was recently introduced by Applebaum et al. (ITCS 2017) that enables CRH in a similar manner to Ajtai’s CRH functions based on the Short Integer Solution (SIS) problem. Furthermore, under certain additional (arguably minimal) idealized assumptions, such as small-domain random functions or that a block cipher (keyed by a public random string) behaves like a random permutation, we obtain more efficient and polynomially shrinking CRH functions from 2 0.5+ε -hard constant-noise LPN or 2 0.25+ε -hard low-noise LPN. In particular, the construction of hash functions follows a conceptually simple approach: it divides its input into many equal-length blocks, evaluates random functions (or blockciphers) on them independently and in parallel, and then produces their XOR sum as output.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration

We study the problem of securely extending the domain of a collision resistant compression function. A new construction based on directed acyclic graphs is described. This generalizes the usual iterated hashing constructions. Our main contribution is to introduce a new technique for hashing arbitrary length strings. Combined with DAG based hashing, this technique gives a new hashing algorithm. ...

متن کامل

A Collision-Resistant Rate-1 Double-Block-Length Hash Function

This paper proposes a construction for collision resistant 2n-bit hash functions, based on n-bit block ciphers with 2n-bit keys. The construction is analysed in the ideal cipher model; for n = 128 an adversary would need roughly 2 units of time to find a collision. The construction employs “combinatorial” hashing as an underlying building block (like Universal Hashing for cryptographic message ...

متن کامل

Sufficient Conditions for Collision-Resistant Hashing

We present several new constructions of collision-resistant hash-functions (CRHFs) from general assumptions. We start with a simple construction of CRHF from any homomorphic encryption. Then, we strengthen this result by presenting constructions of CRHF from two other primitives that are implied by homomorphic-encryption: one-round private information retrieval (PIR) protocols and homomorphic o...

متن کامل

Hash-and-Sign with Weak Hashing Made Secure

Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a weak hash function by a random oracle together with another oracle allowing to break some properties of the hash function, e.g. a preimage oracle. To avoid the need for collision-resistance, Bellare and Rogaway proposed to use ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017