{"title":"从多重防撞功能到防撞功能","authors":"","doi":"10.1007/s00145-024-09495-5","DOIUrl":null,"url":null,"abstract":"<h3>Abstract</h3> <p>Collision-resistant hash functions (<span> <span>\\(\\textsf{CRH}\\)</span> </span>) are a fundamental and ubiquitous cryptographic primitive. Several recent works have studied a relaxation of <span> <span>\\(\\textsf{CRH}\\)</span> </span> called <em>t</em><em>-way multi-collision-resistant hash functions</em> (<span> <span>\\(t\\text {-}\\textsf{MCRH}\\)</span> </span>). These are families of functions for which it is computationally hard to find a <em>t</em>-way collision, even though such collisions are abundant (and even <span> <span>\\((t-1)\\)</span> </span>-way collisions may be easy to find). The case of <span> <span>\\(t=2\\)</span> </span> corresponds to standard <span> <span>\\(\\textsf{CRH}\\)</span> </span>, but it is natural to study <em>t</em>-<span> <span>\\(\\textsf{MCRH}\\)</span> </span> for larger values of <em>t</em>. Multi-collision resistance seems to be a qualitatively weaker property than standard collision resistance. Nevertheless, in this work we show a <em>non-blackbox</em> transformation of any moderately shrinking <em>t</em>-<span> <span>\\(\\textsf{MCRH}\\)</span> </span>, for <span> <span>\\(t \\in \\{3,4\\}\\)</span> </span>, into an (infinitely often secure) <span> <span>\\(\\textsf{CRH}\\)</span> </span>. This transformation is non-constructive—we can prove the existence of a <span> <span>\\(\\textsf{CRH}\\)</span> </span> but cannot explicitly point out a construction. Our result partially extends to larger values of <em>t</em>. In particular, we show that for suitable values of <span> <span>\\(t>t'\\)</span> </span>, we can transform a <em>t</em>-<span> <span>\\(\\textsf{MCRH}\\)</span> </span> into a <span> <span>\\(t'\\)</span> </span>-<span> <span>\\(\\textsf{MCRH}\\)</span> </span>, at the cost of reducing the shrinkage of the resulting hash function family and settling for infinitely often security. This result utilizes the list-decodability properties of Reed–Solomon codes.</p>","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"11 1","pages":""},"PeriodicalIF":2.3000,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Collision Resistance from Multi-collision Resistance\",\"authors\":\"\",\"doi\":\"10.1007/s00145-024-09495-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<h3>Abstract</h3> <p>Collision-resistant hash functions (<span> <span>\\\\(\\\\textsf{CRH}\\\\)</span> </span>) are a fundamental and ubiquitous cryptographic primitive. Several recent works have studied a relaxation of <span> <span>\\\\(\\\\textsf{CRH}\\\\)</span> </span> called <em>t</em><em>-way multi-collision-resistant hash functions</em> (<span> <span>\\\\(t\\\\text {-}\\\\textsf{MCRH}\\\\)</span> </span>). These are families of functions for which it is computationally hard to find a <em>t</em>-way collision, even though such collisions are abundant (and even <span> <span>\\\\((t-1)\\\\)</span> </span>-way collisions may be easy to find). The case of <span> <span>\\\\(t=2\\\\)</span> </span> corresponds to standard <span> <span>\\\\(\\\\textsf{CRH}\\\\)</span> </span>, but it is natural to study <em>t</em>-<span> <span>\\\\(\\\\textsf{MCRH}\\\\)</span> </span> for larger values of <em>t</em>. Multi-collision resistance seems to be a qualitatively weaker property than standard collision resistance. Nevertheless, in this work we show a <em>non-blackbox</em> transformation of any moderately shrinking <em>t</em>-<span> <span>\\\\(\\\\textsf{MCRH}\\\\)</span> </span>, for <span> <span>\\\\(t \\\\in \\\\{3,4\\\\}\\\\)</span> </span>, into an (infinitely often secure) <span> <span>\\\\(\\\\textsf{CRH}\\\\)</span> </span>. This transformation is non-constructive—we can prove the existence of a <span> <span>\\\\(\\\\textsf{CRH}\\\\)</span> </span> but cannot explicitly point out a construction. Our result partially extends to larger values of <em>t</em>. In particular, we show that for suitable values of <span> <span>\\\\(t>t'\\\\)</span> </span>, we can transform a <em>t</em>-<span> <span>\\\\(\\\\textsf{MCRH}\\\\)</span> </span> into a <span> <span>\\\\(t'\\\\)</span> </span>-<span> <span>\\\\(\\\\textsf{MCRH}\\\\)</span> </span>, at the cost of reducing the shrinkage of the resulting hash function family and settling for infinitely often security. This result utilizes the list-decodability properties of Reed–Solomon codes.</p>\",\"PeriodicalId\":54849,\"journal\":{\"name\":\"Journal of Cryptology\",\"volume\":\"11 1\",\"pages\":\"\"},\"PeriodicalIF\":2.3000,\"publicationDate\":\"2024-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Cryptology\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s00145-024-09495-5\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Cryptology","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s00145-024-09495-5","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Collision Resistance from Multi-collision Resistance
Abstract
Collision-resistant hash functions (\(\textsf{CRH}\)) are a fundamental and ubiquitous cryptographic primitive. Several recent works have studied a relaxation of \(\textsf{CRH}\) called t-way multi-collision-resistant hash functions (\(t\text {-}\textsf{MCRH}\)). These are families of functions for which it is computationally hard to find a t-way collision, even though such collisions are abundant (and even \((t-1)\)-way collisions may be easy to find). The case of \(t=2\) corresponds to standard \(\textsf{CRH}\), but it is natural to study t-\(\textsf{MCRH}\) for larger values of t. Multi-collision resistance seems to be a qualitatively weaker property than standard collision resistance. Nevertheless, in this work we show a non-blackbox transformation of any moderately shrinking t-\(\textsf{MCRH}\), for \(t \in \{3,4\}\), into an (infinitely often secure) \(\textsf{CRH}\). This transformation is non-constructive—we can prove the existence of a \(\textsf{CRH}\) but cannot explicitly point out a construction. Our result partially extends to larger values of t. In particular, we show that for suitable values of \(t>t'\), we can transform a t-\(\textsf{MCRH}\) into a \(t'\)-\(\textsf{MCRH}\), at the cost of reducing the shrinkage of the resulting hash function family and settling for infinitely often security. This result utilizes the list-decodability properties of Reed–Solomon codes.
期刊介绍:
The Journal of Cryptology is a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Coverage includes such topics as public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, key management and quantum cryptography. In addition to full-length technical, survey, and historical articles, the journal publishes short notes.