@inproceedings{ccf061cadf694cfda6d64e15c7be3cd0,
title = "Decisional second-preimage resistance: when does SPR imply PRE?",
abstract = "There is a well-known gap between second-preimage resistance and preimage resistance for length-preserving hash functions. This paper introduces a simple concept that fills this gap. One consequence of this concept is that tight reductions can remove interactivity for multi-target length-preserving preimage problems, such as the problems that appear in analyzing hash-based signature systems. Previous reduction techniques applied to only a negligible fraction of all length-preserving hash functions, presumably excluding all off-the-shelf hash functions.",
keywords = "Cryptographic hash functions, Hash-based signatures, Multi-target attacks, Preimage resistance, Provable security, Second-preimage resistance, Tight reductions",
author = "Bernstein, {Daniel J.} and Andreas H{\"u}lsing",
year = "2019",
month = nov,
day = "22",
doi = "10.1007/978-3-030-34618-8_2",
language = "English",
isbn = "978-3-030-34617-1",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer",
pages = "33--62",
editor = "Galbraith, {Steven D.} and Shiho Moriai",
booktitle = "Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings",
address = "Germany",
note = "25th Annual International Conference on Theory and Application of Cryptology and Information Security, (ASIACRYPT 2019) ; Conference date: 08-12-2019 Through 12-12-2019",
}