In this work we show how to go beyond the aforementioned birthday attack barrier by replacing the above simple hashing approach with a variant of cuckoo hashing, a hashing paradigm that resolves collisions in a table by using two hash functions and two tables, cleverly assigning each element to one of the two tables. We use this approach to obtain: (i) a domain extension method that requires just two calls to the original PRF, can withstand as many queries as the original domain size, and has a distinguishing probability that is exponentially small in the amount of non-cryptographic work; and (ii) a security-preserving reduction from non-adaptive to adaptive PRFs.
Category / Keywords: foundations / cuckoo hashing; pseudorandom functions ; hardness preserving reductions; domain extension; non-adaptive to adaptive Publication Info: TCC 2013 proceedings Date: received 24 Dec 2012, last revised 20 Oct 2015 Contact author: ilan komargodski at weizmann ac il Available format(s): PDF | BibTeX Citation Note: Full version. Version: 20151020:101716 (All versions of this report) Short URL: ia.cr/2012/722 Discussion forum: Show discussion | Start new discussion