Short collision search in arbitrary SL2 homomorphic hash functions

نویسندگان

  • Ciaran Mullan
  • Boaz Tsaban
چکیده

We study homomorphic hash functions into SL2(q), the 2 × 2 matrices with determinant 1 over the field with q elements. Modulo a well supported number theoretic hypothesis, which holds in particular for all concrete homomorphisms proposed thus far, we prove that a random homomorphism is at least as secure as any concrete homomorphism. For a family of homomorphisms containing several concrete proposals in the literature, we prove that collisions of length O(log q) can be found in running time O( √ q). For general homomorphisms we offer an algorithm that, heuristically and according to experiments, in running time O( √ q) finds collisions of length O(log q) for q even, and length O(logq/ log log q) for arbitrary q. For any conceivable practical scenario, our algorithms are substantially faster than all earlier algorithms and produce much shorter collisions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SL2 homomorphic hash functions: worst case to average case reduction and short collision search

We study homomorphic hash functions into SL2(q), the 2 × 2 matrices with determinant 1 over the field with q elements. Modulo a well supported number theoretic hypothesis, which holds in particular for all concrete homomorphisms proposed thus far, we prove that a random homomorphism is at least as secure as any concrete homomorphism. For a family of homomorphisms containing several concrete pro...

متن کامل

Navigating in the Cayley graph of SL2(Fp) and applications to hashing

Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi)group. In this paper, we focus on hashing with 2× 2 matrices over Fp. Since there are many known pairs of 2× 2 matrices over Z that generate a free m...

متن کامل

Sufficient Conditions for Collision-Resistant Hashing

We present several new constructions of collision-resistant hash-functions (CRHFs) from general assumptions. We start with a simple construction of CRHF from any homomorphic encryption. Then, we strengthen this result by presenting constructions of CRHF from two other primitives that are implied by homomorphic-encryption: one-round private information retrieval (PIR) protocols and homomorphic o...

متن کامل

Elliptic Curve Multiset Hash

A homomorphic, or incremental, multiset hash function, associates a hash value to arbitrary collections of objects (with possible repetitions) in such a way that the hash of the union of two collections is easy to compute from the hashes of the two collections themselves: it is simply their sum under a suitable group operation. In particular, hash values of large collections can be computed inc...

متن کامل

Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups

We initiate the study of (weakly) pseudo-free families of computational elementary abelian pgroups, where p is an arbitrary fixed prime. We restrict ourselves to families of computational elementary abelian p-groups Gd such that for every index d, each element of Gd is represented by a single bit string of length polynomial in the length of d. First, we prove that pseudo-freeness and weak pseud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013