Limits on the E ciency of One-Way Permutation-Based Hash Functions
نویسندگان
چکیده
Naor and Yung show that a one-bit-compressing universal one-way hash function (UOWHF) can be constructed based on a one-way permutation. This construction can be iterated to build a UOWHF which compresses by "n bits, at the cost of "n invocations of the one-way permutation. We show that this construction is not far from optimal, in the following sense: there exists an oracle relative to which there exists a one-way permutation with inversion probability 2 ?p(n) (for any p(n) 2 !(log n)), but any construction of an n-bit-compressing UOWHF requires (p n=p(n)) invocations of the one-way 1 permutation, on average. (For example, there exists in this relativized world a one-way permutation with inversion probability n ?!(1) , but no UOWHF that invokes it fewer than (p n= log n) times.) Thus any proof that a more eecient UOWHF can be derived from a one-way permutation is necessarily non-relativizing; in particular, no provable construction of a more eecient UOWHF can exist based solely on a \black box" one-way permutation. This result can be viewed as a partial justiication for the practice of building eecient UOWHFs from stronger primitives (such as collision-intractable hash functions), rather than from weaker primitives such as one-way permutations.
منابع مشابه
Limits on the E ciency of One - Way Permutation - Based HashFunctionsJeong
Naor and Yung ((NY89]) show that a one-bit-compressing universal one-way hash function (UOWHF) can be constructed based on a one-way permutation. This construction can be iterated to build a UOWHF which compresses by "n bits, at the cost of "n invocations of the one-way permutation. We show that this construction is not far from optimal, in the following sense: there exists an oracle relative t...
متن کاملLower Bounds on the E ciency of Generic Cryptographic Constructions
We present lower bounds on the e ciency of constructions for Pseudo-Random Generators (PRGs) and Universal One-Way Hash Functions (UOWHFs) based on black-box access to one-way permutations. Our lower bounds are tight as they match the e ciency of known constructions. A PRG (resp. UOWHF) construction based on black-box access is a machine that is given oracle access to a permutation. Whenever th...
متن کاملLimits on the Efficiency of One-Way Permutation-Based Hash Functions
Naor and Yung show that a one-bit-compressing universal one-way hash function (UOWHF) can be constructed based on a one-way permutation. This construction can be iterated to build a UOWHF which compresses by εn bits, at the cost of εn invocations of the one-way permutation. We show that this construction is not far from optimal, in the following sense: there exists an oracle relative to which t...
متن کاملA NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
متن کاملFinding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions?
We prove the existence of an oracle relative to which there exist seveial well-known cryptographic primitives, including one-way permutations, but excluding (for a suitably strong definition) collision-intractible hash functions. Thus any proof that such functions can be derived from these weaker primitives is necessarily non-relativizing; in particular, no provable construction of a collision-...
متن کامل