2012
DOI: 10.1007/978-3-642-34961-4_11
|View full text |Cite
|
Sign up to set email alerts
|

The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions

Abstract: This paper presents the Generalized Randomized Iterate of a (regular) one-way function f and show that it can be used to build Universal One-Way Hash Function (UOWHF) families with O(n 2) key length. We then show that Shoup's technique for UOWHF domain extension can be used to improve the efficiency of the previous construction. We present the Reusable Generalized Randomized Iterate which consists of k ≥ n + 1 iterations of a regular one-way function composed at each iteration with a pairwise independent hash … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
14
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(15 citation statements)
references
References 18 publications
1
14
0
Order By: Relevance
“…Note that the bound given in [5] does not say anything for the mere construction of a UOWHF (e.g., for a function which compresses one bit), and prior to our work it would have been possible to conjecture that there exists a construction of a UOWHF from a general one-way function that makes only one call to the underlying one-way function. Our bound matches exactly and up to a log-factor the number of calls made by the constructions of [4] and [1], respectively.…”
Section: Our Contributionsupporting
confidence: 52%
See 3 more Smart Citations
“…Note that the bound given in [5] does not say anything for the mere construction of a UOWHF (e.g., for a function which compresses one bit), and prior to our work it would have been possible to conjecture that there exists a construction of a UOWHF from a general one-way function that makes only one call to the underlying one-way function. Our bound matches exactly and up to a log-factor the number of calls made by the constructions of [4] and [1], respectively.…”
Section: Our Contributionsupporting
confidence: 52%
“…Set F ⊂ R n,i (P, I) to be the set of all functions for which (2) holds. It follows that |F | ≥ 1 6 · 2 i , as |R n,i (P, I)| = |P i |. We next show that for the class of functions R n,i (P, I) the oracle can be implemented such that it is stable.…”
Section: Lemmamentioning
confidence: 90%
See 2 more Smart Citations
“…A succeeds if x, x ∈ {0, 1} n(k) , x = x , and F z (x) = F z (x ). 1 It turns out that this weaker security property suffices for many applications. The most immediate application given in [23] is secure fingerprinting, whereby the pair ( f , f (x)) can be taken as a compact "fingerprint" of a large file x, such that it is infeasible for an adversary, seeing the fingerprint, to change the file x to x without being detected.…”
mentioning
confidence: 99%