A Primitive for Proving the Security of EveryBit and About Universal Hash Functions & Hard Core

نویسنده

  • Eike Kiltz
چکیده

Bit and About Universal Hash Functions & Hard Core Bits Eike Kiltz Lehrstuhl Mathematik & Informatik, Fakult at f ur Mathematik, Ruhr-Universit at Bochum, 44780 Bochum, Germany. Fax:+49-234-3214465 [email protected] Abstract. We present a useful primitive, the hidden number problem, which can be exploited to prove that every bit is a hard core of speci c cryptographic functions. Applications are RSA, ElGamal, Rabin and others. We give an e cient construction of a hard core predicate of any one-way function providing an alternative to the famous GoldreichLevin Bit [3]. Furthermore, a conjectured connection between universal hash functions and hard core predicates is disproven.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Primitive for Proving the Security of Every Bit andAbout Universal Hash Functions & Hard CorePredicates ?

In 1999, J. H astad and M. NN aslund 13] could prove that every bit is a hard core of the RSA function. From this work we extract an abstract theorem about the hidden number problem which can be used to prove that every bit is a hard core of many speciic cryptographic functions. Applications are RSA, ElGamal, Rabin, a modiied Diie-Hellman function, Pailler's cryptosystem, the Diie-Hellman funct...

متن کامل

Universal Hash Functions & Hard Core Bits

In this paper we consider the bit-security of two types of universal hash functions: linear functions on GFF2 n ] and linear functions on the integers modulo a prime. We show individual security for all bits in the rst case and for the O(log n) least signiicant bits in the second case. Both types of functions are shown to have O(log n) simultaneous secure bits. For the second type of functions,...

متن کامل

Automated Security Proofs for Almost-Universal Hash for MAC Verification

Message authentication codes (MACs) are an essential primitive in cryptography. They are used to ensure the integrity and authenticity of a message, and can also be used as a building block for larger schemes, such as chosenciphertext secure encryption, or identity-based encryption. MACs are often built in two steps: first, the ‘front end’ of the MAC produces a short digest of the long message,...

متن کامل

A Cookbook for Black-Box Separations and a Recipe for UOWHFs

We present a new framework for proving fully black-box separations and lower bounds. We prove a general theorem that facilitates the proofs of fully black-box lower bounds from a one-way function (OWF). Loosely speaking, our theorem says that in order to prove that a fully black-box construction does not securely construct a cryptographic primitive Q (e.g., a pseudo-random generator or a univer...

متن کامل

Generating short-output digest functions

This paper introduces two related methods of generating a new cryptographic primitive termed digest which has similarities to -balanced and almost universal hash functions. Digest functions, however, typically have a very short output, e.g. 16-64 bits, and hence they are not required to resist collision and inversion attacks. They also have the potential to be very fast to compute relative to l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001