Abstract
There is a well-known gap between second-preimage resistance and preimage resistance for length-preserving hash functions. This paper introduces a simple concept that fills this gap. One consequence of this concept is that tight reductions can remove interactivity for multi-target length-preserving preimage problems, such as the problems that appear in analyzing hash-based signature systems. Previous reduction techniques applied to only a negligible fraction of all length-preserving hash functions, presumably excluding all off-the-shelf hash functions.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings |
Editors | Steven D. Galbraith, Shiho Moriai |
Place of Publication | Berlin |
Publisher | Springer |
Chapter | 2 |
Pages | 33-62 |
Number of pages | 30 |
ISBN (Electronic) | 978-3-030-34618-8 |
ISBN (Print) | 978-3-030-34617-1 |
DOIs | |
Publication status | Published - 22 Nov 2019 |
Event | 25th Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2019 - Kobe, Japan Duration: 8 Dec 2019 → 12 Dec 2019 Conference number: 25 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 11923 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 25th Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2019 |
---|---|
Abbreviated title | ASIACRYPT 2019 |
Country/Territory | Japan |
City | Kobe |
Period | 8/12/19 → 12/12/19 |
Keywords
- Cryptographic hash functions
- Hash-based signatures
- Multi-target attacks
- Preimage resistance
- Provable security
- Second-preimage resistance
- Tight reductions