A Primitive for Proving the Security of Every Bit andAbout Universal Hash Functions & Hard CorePredicates ?

نویسنده

  • Eike Kiltz
چکیده

In 1999, J. H astad and M. NN aslund 13] could prove that every bit is a hard core of the RSA function. From this work we extract an abstract theorem about the hidden number problem which can be used to prove that every bit is a hard core of many speciic cryptographic functions. Applications are RSA, ElGamal, Rabin, a modiied Diie-Hellman function, Pailler's cryptosystem, the Diie-Hellman function for elliptic curves and discrete exponentiation. So far all in the literature known general constructions of hard core predicates for any one-way function (for example the famous Goldreich-Levin Bit 12]) are based on some set of universal hash functions (UHF). The natural open question was if there may be a nice connection between UHF and hard core predicates. We present an example providing a negative answer to that question. Furthermore, as an alternative to the Goldreich-Levin Bit, we give a new and eecient construction of a hard core predicate of any one-way function that is based on the hidden number problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Primitive for Proving the Security of EveryBit and About Universal Hash Functions & Hard Core

Bit and About Universal Hash Functions & Hard Core Bits Eike Kiltz Lehrstuhl Mathematik & Informatik, Fakult at f ur Mathematik, Ruhr-Universit at Bochum, 44780 Bochum, Germany. Fax:+49-234-3214465 [email protected] Abstract. We present a useful primitive, the hidden number problem, which can be exploited to prove that every bit is a hard core of speci c cryptographic functions. A...

متن کامل

Universal Hash Functions & Hard Core Bits

In this paper we consider the bit-security of two types of universal hash functions: linear functions on GFF2 n ] and linear functions on the integers modulo a prime. We show individual security for all bits in the rst case and for the O(log n) least signiicant bits in the second case. Both types of functions are shown to have O(log n) simultaneous secure bits. For the second type of functions,...

متن کامل

A Cookbook for Black-Box Separations and a Recipe for UOWHFs

We present a new framework for proving fully black-box separations and lower bounds. We prove a general theorem that facilitates the proofs of fully black-box lower bounds from a one-way function (OWF). Loosely speaking, our theorem says that in order to prove that a fully black-box construction does not securely construct a cryptographic primitive Q (e.g., a pseudo-random generator or a univer...

متن کامل

Expedient Non-malleability Notions for Hash Functions

Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively studied for commitments, encryption and zero-knowledge proofs, but it was not until recently that the notion—and its peculiarities— have been considered for hash functions by Boldyreva et al. (Asiacrypt 2009). They give...

متن کامل

Generating short-output digest functions

This paper introduces two related methods of generating a new cryptographic primitive termed digest which has similarities to -balanced and almost universal hash functions. Digest functions, however, typically have a very short output, e.g. 16-64 bits, and hence they are not required to resist collision and inversion attacks. They also have the potential to be very fast to compute relative to l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002