Two sufficient conditions of the r-SPR property

Lingyun Li, Junqing Li, Hui-Shan Yu, Shengxian Xie
{"title":"Two sufficient conditions of the r-SPR property","authors":"Lingyun Li, Junqing Li, Hui-Shan Yu, Shengxian Xie","doi":"10.1109/ICASID.2012.6325283","DOIUrl":null,"url":null,"abstract":"Some variants of second-preimage resistance(SPR) [1] assumptions of the keyless compression function, called c-SPR, r-SPR and e-SPR, have been put forth by Halevi and Krawczyk [2], in order to obtain more secure properties for the dedicated-key hash function. In this paper, we provide a full picture of the relation between r-SPR and other two security properties, Universal e-SPR and CR0 (n + b, n), and obtain two sufficient conditions of r-SPR, our contributions are twofold. Firstly, we extend the definition of the e-SPR property into the more general situation, called Universal e-SPR, we point out that for the keyless compression function, the Universal e-SPR property implies r-SPR. In the second part of this paper, we extend the analysis into the dedicated-key compression function, we point CRn (n + b, n) and CR0 (n + b, n) are c-SPR and r-SPR as for the keyless compression and hash functions. We continue analyze the dedicated-key compression family hk (c, m) = h(c, m ⊕ k) used by Bellare and Rogaway to construct TCR hash function via iterations on the SPR-like assumption [2], and get the conclusion that CR0 (n + b, n) in the case of hk (c, m) implies r-SPR of keyless compression function, that is, CR0 (n + b, n) is more secure than the r-SPR property for this specific scheme.","PeriodicalId":408223,"journal":{"name":"Anti-counterfeiting, Security, and Identification","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Anti-counterfeiting, Security, and Identification","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2012.6325283","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Some variants of second-preimage resistance(SPR) [1] assumptions of the keyless compression function, called c-SPR, r-SPR and e-SPR, have been put forth by Halevi and Krawczyk [2], in order to obtain more secure properties for the dedicated-key hash function. In this paper, we provide a full picture of the relation between r-SPR and other two security properties, Universal e-SPR and CR0 (n + b, n), and obtain two sufficient conditions of r-SPR, our contributions are twofold. Firstly, we extend the definition of the e-SPR property into the more general situation, called Universal e-SPR, we point out that for the keyless compression function, the Universal e-SPR property implies r-SPR. In the second part of this paper, we extend the analysis into the dedicated-key compression function, we point CRn (n + b, n) and CR0 (n + b, n) are c-SPR and r-SPR as for the keyless compression and hash functions. We continue analyze the dedicated-key compression family hk (c, m) = h(c, m ⊕ k) used by Bellare and Rogaway to construct TCR hash function via iterations on the SPR-like assumption [2], and get the conclusion that CR0 (n + b, n) in the case of hk (c, m) implies r-SPR of keyless compression function, that is, CR0 (n + b, n) is more secure than the r-SPR property for this specific scheme.
r-SPR性质的两个充分条件
Halevi和Krawczyk[2]提出了无密钥压缩函数的抗二次预像性(SPR)[1]假设的一些变体,称为c-SPR、r-SPR和e-SPR,以获得专用密钥哈希函数更安全的性质。本文给出了r-SPR与通用e-SPR和CR0 (n + b, n)两个安全性质之间的关系,并得到了r-SPR的两个充分条件,贡献是双重的。首先,我们将e-SPR性质的定义推广到更一般的情况,称为通用e-SPR,我们指出对于无键压缩函数,通用e-SPR性质隐含r-SPR。在本文的第二部分,我们将分析扩展到专用密钥压缩函数,我们指出CRn (n + b, n)和CR0 (n + b, n)对于无密钥压缩和哈希函数是c-SPR和r-SPR。我们继续分析Bellare和Rogaway在类似spr的假设[2]上通过迭代构造TCR哈希函数所使用的专用密钥压缩族hk (c, m) = h(c, m⊕k),并得出在hk (c, m)的情况下CR0 (n + b, n)隐含无密钥压缩函数的r-SPR的结论,即CR0 (n + b, n)比该特定方案的r-SPR性质更安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信