{"title":"增量加密和公共哈希函数的安全性","authors":"Tj Odule","doi":"10.4314/JONAMP.V11I1.40244","DOIUrl":null,"url":null,"abstract":"An investigation of incremental algorithms for crytographic functions was initiated. The problem, for collision-free hashing, is to design a scheme for which there exists an efficient “update” algorithm: this algorithm is given the hash function H, the hash h = H(M) of message M and the “replacement request” (j, m), and outputs the hash H(M(j, m)) of the modified message. Ideally, the update time should depend only on the block size b and the underlying security parameter k, and not on the length of the message.\n JONAMP Vol. 11 2007: pp. 467-474","PeriodicalId":402697,"journal":{"name":"Journal of the Nigerian Association of Mathematical Physics","volume":"38 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Incremental cryptography and security of public hash functions\",\"authors\":\"Tj Odule\",\"doi\":\"10.4314/JONAMP.V11I1.40244\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An investigation of incremental algorithms for crytographic functions was initiated. The problem, for collision-free hashing, is to design a scheme for which there exists an efficient “update” algorithm: this algorithm is given the hash function H, the hash h = H(M) of message M and the “replacement request” (j, m), and outputs the hash H(M(j, m)) of the modified message. Ideally, the update time should depend only on the block size b and the underlying security parameter k, and not on the length of the message.\\n JONAMP Vol. 11 2007: pp. 467-474\",\"PeriodicalId\":402697,\"journal\":{\"name\":\"Journal of the Nigerian Association of Mathematical Physics\",\"volume\":\"38 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-06-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of the Nigerian Association of Mathematical Physics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4314/JONAMP.V11I1.40244\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of the Nigerian Association of Mathematical Physics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4314/JONAMP.V11I1.40244","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
对加密函数的增量算法进行了研究。对于无冲突哈希,问题是设计一个方案,该方案存在一个有效的“更新”算法:该算法给定哈希函数H,消息M的哈希值H = H(M)和“替换请求”(j, M),并输出修改后消息的哈希值H(M(j, M))。理想情况下,更新时间应该只取决于块大小b和底层安全参数k,而不取决于消息的长度。JONAMP Vol. 11 2007: pp. 467-474
Incremental cryptography and security of public hash functions
An investigation of incremental algorithms for crytographic functions was initiated. The problem, for collision-free hashing, is to design a scheme for which there exists an efficient “update” algorithm: this algorithm is given the hash function H, the hash h = H(M) of message M and the “replacement request” (j, m), and outputs the hash H(M(j, m)) of the modified message. Ideally, the update time should depend only on the block size b and the underlying security parameter k, and not on the length of the message.
JONAMP Vol. 11 2007: pp. 467-474