2018
DOI: 10.1007/978-3-319-78375-8_5
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Collision Resistant Hash Functions and Their Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(8 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…Multi-collisions algorithms have also been used in attacks, such as the MDC-2 [KMRT09], HMAC [NSWY13], Even-Mansour [DDKS14], and LED [NWW14]. Multicollision resistance for polynomial k has also recently emerged as a theoretical way to avoid keyed hash functions [BKP18,BDRV18], or as a useful cryptographic primitives, for example, to build statistically hiding commitment schemes with succinct interaction [KNY18].…”
Section: Introductionmentioning
confidence: 99%
“…Multi-collisions algorithms have also been used in attacks, such as the MDC-2 [KMRT09], HMAC [NSWY13], Even-Mansour [DDKS14], and LED [NWW14]. Multicollision resistance for polynomial k has also recently emerged as a theoretical way to avoid keyed hash functions [BKP18,BDRV18], or as a useful cryptographic primitives, for example, to build statistically hiding commitment schemes with succinct interaction [KNY18].…”
Section: Introductionmentioning
confidence: 99%
“…Using this oracle, Asharov and Segev [3] proves the separation result of CRH from OWP and indistinguishability obfuscators. Berman et al [7] proves the separation result of MCRH from OWP. We follow their work and show a similar result about k-rSRH.…”
Section: Proofmentioning
confidence: 86%
“…In 2005, Haitner et al [21] prove the fully black-box separation of constant-round statistically-hiding commitment schemes from one-way permutations. Furthermore, Berman et al [7] and Komargodski et al [29] independently construct constant-round statisticallyhiding commitment schemes from MCRH in fully black-box manners. This rules out the possibility of constructing an MCRH from one-way permutations in fully black-box manners.…”
Section: Black-box Separationmentioning
confidence: 99%
“…Constant-round statistically hiding commitment protocols are known to exist based on families of collision resistant hash functions [NY89,DPP93,HM96]. Recently, Berman, Degwekar, Rothblum and Vasudevan [BDRV18] and Komargodski, Naor and Yogev [KNY18] constructed constant-round statistically hiding commitment protocols assuming the existence of multi -collision resistant hash functions.…”
Section: Related Work On Statistically Hiding Commitmentsmentioning
confidence: 99%
“…2 (let alone plain collision resistance). This can be seen as evidence suggesting that dCRH may be weaker than collision resistance, or even multi-collision resistance [KNY17,BDRV18,BKP18,KNY18].…”
Section: Introductionmentioning
confidence: 99%