Paper 2018/221
Bandwidth-Hard Functions: Reductions and Lower Bounds
Abstract
Memory Hard Functions (MHFs) have been proposed as an answer to the growing inequality between the computational speed of general purpose CPUs and Application Specific Integrated Circuits (ASICs).
MHFs have seen widespread applications including password hashing, key stretching and proofs of work.
Several metrics have been proposed to quantify the ``memory hardness'' of a function. Cumulative memory complexity (CMC) (Alwen and Serbinenko, STOC 2015) (or amortized Area
Note: Appeared in Journal of Cryptology 2024, extended full version of CCS 2018 paper. The original version of this paper appeared at CCS 2018 with Jeremiah Blocki, Ling Ren and Samson Zhou as authors. The updated paper includes full/unconditional lower bound on the bandwidth hardness of Scrypt resolving an open question from the original version of the paper. Peiyuan Liu has been added as an author for her contributions to the new Scrypt lower bound. The updated paper also corrects several bugs in the paper.
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Published elsewhere. Major revision. (Extended full version) Journal of Cryptology 2024; Proceedings of the 25th ACM Conference on Computer Security (CCS 2018)
- DOI
- 10.1007/s00145-024-09497-3
- Keywords
- CryptanalysisHash FunctionsBandwidth-Hard FunctionsMHFsArgon2iscryptRed-blue pebbling
- Contact author(s)
-
jblocki @ purdue edu
liu2039 @ purdue edu
renling @ illinois edu
samsonzhou @ gmail com - History
- 2024-08-05: last of 9 revisions
- 2018-02-27: received
- See all versions
- Short URL
- https://ia.cr/2018/221
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/221, author = {Jeremiah Blocki and Peiyuan Liu and Ling Ren and Samson Zhou}, title = {Bandwidth-Hard Functions: Reductions and Lower Bounds}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/221}, year = {2018}, doi = {10.1007/s00145-024-09497-3}, url = {https://eprint.iacr.org/2018/221} }