跳到主要导航 跳到搜索 跳到主要内容

Collision Resistant Hashing from Sub-exponential Learning Parity with Noise

  • Shanghai Jiao Tong University
  • State Key Laboratory of Cryptology
  • Westone Cryptologic Research Center
  • Jinan University
  • Shandong University

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

The Learning Parity with Noise (LPN) problem has recently found many cryptographic applications such as authentication protocols, pseudorandom generators/functions and even asymmetric tasks including public-key encryption (PKE) schemes and oblivious transfer (OT) protocols. It however remains a long-standing open problem whether LPN implies collision resistant hash (CRH) functions. Inspired by the recent work of Applebaum et al. (ITCS 2017), we introduce a general construction of CRH from LPN for various parameter choices. We show that, just to mention a few notable ones, under any of the following hardness assumptions (for the two most common variants of LPN) 1.constant-noise LPN is (formula presented)-hard for any constant (formula presented);2.constant-noise LPN is (formula presented)-hard given (formula presented) samples;3.low-noise LPN (of noise rate (formula presented) is (formula presented)-hard given (formula presented) samples. there exists CRH functions with constant (or even poly-logarithmic) shrinkage, which can be implemented using polynomial-size depth-3 circuits with NOT, (unbounded fan-in) AND and XOR gates. Our technical route LPN (formula presented) CRH is reminiscent of the known reductions for the large-modulus analogue, i.e., LWE (formula presented) SIS (formula presented) CRH, where the binary Shortest Vector Problem (bSVP) was recently introduced by Applebaum et al. (ITCS 2017) that enables CRH in a similar manner to Ajtai’s CRH functions based on the Short Integer Solution (SIS) problem. Furthermore, under additional (arguably minimal) idealized assumptions such as small-domain random functions or random permutations (that trivially imply collision resistance), we still salvage a simple and elegant collision-resistance-preserving domain extender combining the best of the two worlds, namely, maximized (depth one) parallelizability and polynomial shrinkage. In particular, assume (formula presented)-hard constant-noise LPN or (formula presented)-hard low-noise LPN, we obtain a collision resistant hash function that evaluates in parallel only a single layer of small-domain random functions (or random permutations) and shrinks polynomially.

源语言英语
主期刊名Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
编辑Steven D. Galbraith, Shiho Moriai
出版商Springer Science and Business Media Deutschland GmbH
3-24
页数22
ISBN(印刷版)9783030346201
DOI
出版状态已出版 - 2019
活动25th Annual International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019 - Kobe, 日本
期限: 8 12月 201912 12月 2019

出版系列

姓名Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
11922 LNCS
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议25th Annual International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019
国家/地区日本
Kobe
时期8/12/1912/12/19

指纹

探究 'Collision Resistant Hashing from Sub-exponential Learning Parity with Noise' 的科研主题。它们共同构成独一无二的指纹。

引用此