Paper 2017/036
Low-Complexity Cryptographic Hash Functions
Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, and Vinod Vaikuntanathan
Abstract
Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function. The most common type of such hash functions is {\em collision resistant} hash functions (CRH), which prevent an efficient attacker from finding a pair of inputs on which the function has the same output.
Despite the ubiquitous role of hash functions in cryptography, several of the most basic questions regarding their computational and algebraic complexity remained open. In this work we settle most of these questions under new, but arguably quite conservative, cryptographic assumptions, whose study may be of independent interest. Concretely, we obtain the following results:
(1) Low-complexity CRH. Assuming the intractability of finding short codewords in natural families of linear error-correcting codes, there are CRH that shrink the input by a constant factor and have a {\em constant algebraic degree} over
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Published elsewhere. Minor revision. The 8th Innovations in Theoretical Computer Science (ITCS)
- Keywords
- collision resistant hashingcryptography with low complexity
- Contact author(s)
- benny applebaum @ gmail com
- History
- 2017-01-14: received
- Short URL
- https://ia.cr/2017/036
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/036, author = {Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan}, title = {Low-Complexity Cryptographic Hash Functions}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/036}, year = {2017}, url = {https://eprint.iacr.org/2017/036} }