Paper 2015/315
Query-Complexity Amplification for Random Oracles
Grégory Demay, Peter Gaži, Ueli Maurer, and Björn Tackmann
Abstract
Increasing the computational complexity of evaluating a hash
function, both for the honest users as well as for an
adversary, is a useful technique employed for example in
password-based cryptographic schemes to impede brute-force
attacks, and also in so-called proofs of work (used in
protocols like Bitcoin) to show that a certain amount of
computation was performed by a legitimate user. A natural
approach to adjust the complexity of a hash function is to
iterate it
Note: Added a section to show more explicitly that the evaluation of a query-complexity amplifier scheme requires a certain minimum amount of queries to the underlying random oracle.
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Published elsewhere. Minor revision. ICITS 2015
- Keywords
- hash functionsrandom oracleindifferentiabilitymoderately hard functions
- Contact author(s)
- gregory demay @ inf ethz ch
- History
- 2015-06-12: revised
- 2015-04-11: received
- See all versions
- Short URL
- https://ia.cr/2015/315
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/315, author = {Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann}, title = {Query-Complexity Amplification for Random Oracles}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/315}, year = {2015}, url = {https://eprint.iacr.org/2015/315} }