**New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators**

*Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs*

**Abstract: **A somewhere statistically binding (SSB) hash, introduced by Hubacek and Wichs (ITCS '15), can be used to hash a long string $x$ to a short digest $y = H_{\hk}(x)$ using a public hashing-key $\hk$. Furthermore, there is a way to set up the hash key $\hk$ to make it statistically binding on some arbitrary hidden position $i$, meaning that: (1) the digest $y$ completely determines the $i$'th bit (or symbol) of $x$ so that all pre-images of $y$ have the same value in the $i$'th position, (2) it is computationally infeasible to distinguish the position $i$ on which $\hk$ is statistically binding from any other position $i'$. Lastly, the hash should have a local opening property analogous to Merkle-Tree hashing, meaning that given $x$ and $y = H_{\hk}(x)$ it should be possible to create a short proof $\pi$ that certifies the value of the $i$'th bit (or symbol) of $x$ without having to provide the entire input $x$. A similar primitive called a positional accumulator, introduced by Koppula, Lewko and Waters (STOC '15) further supports dynamic updates of the hashed value. These tools, which are interesting in their own right, also serve as one of the main technical components in several recent works building advanced applications from indistinguishability obfuscation (iO).

The prior constructions of SSB hashing and positional accumulators required fully homomorphic encryption (FHE) and iO respectively. In this work, we give new constructions of these tools based on well studied number-theoretic assumptions such as DDH, Phi-Hiding and DCR, as well as a general construction from lossy/injective functions.

**Category / Keywords: **foundations / hashing, obfuscation

**Original Publication**** (with minor differences): **IACR-ASIACRYPT-2015

**Date: **received 7 Sep 2015

**Contact author: **wichs at cs neu edu

**Available format(s): **PDF | BibTeX Citation

**Version: **20150908:060649 (All versions of this report)

**Short URL: **ia.cr/2015/869

[ Cryptology ePrint archive ]