skip to main content
10.1145/73007.73011acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Universal one-way hash functions and their cryptographic applications

Authors Info & Claims
Published:01 February 1989Publication History

ABSTRACT

We define a Universal One-Way Hash Function family, a new primitive which enables the compression of elements in the function domain. The main property of this primitive is that given an element x. We prove constructively that universal one-way hash functions exist if any 1-1 one-way functions exist.

Among the various applications of the primitive is a One-Way based Secure Digital Signature Scheme, a system which is based on the existence of any 1-1 One-Way Functions and is secure against the most general attack known. Previously, all provably secure signature schemes were based on the stronger mathematical assumption that trapdoor one-way functions exist.

References

  1. 1.Bellare M. and S. Micali How to Sign Given any Trapdoor Function , Proc. 20th Annual Symposium on the Theory of Computing, Chicago, I1, 1988, pp. 32-42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Blum M. and S. Micali How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits, SIAM Journal on Computing, V. 13, No. 4, Nov. 84, pp. 850-864. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.G. Brassard, C. Crepeau and M. Yung, All NP Can Be Proved in Perfect Zero-Knowledge in Constant Rounds, ICALP 1989, to appear.Google ScholarGoogle Scholar
  4. 4.J. L. Carter and M. N. Wegman, Universal Classes of Hash Functions, Journal of Computer and System Sciences 18 (1979), pp. 143-154.Google ScholarGoogle ScholarCross RefCross Ref
  5. 5.I. B. Damgard, Collision Free Hash Functions and Public Key Signature Schemes , Eurocrypt, 1987.Google ScholarGoogle Scholar
  6. 6.W. Diflie and M. Hellman, New Directions in Cryptography, IEEE Trans. on Information Theory, vol. IT-22, 6 (1976), pp. 644-654.Google ScholarGoogle Scholar
  7. 7.F. A. Fiat and A. Shamir, How to Prove Yourself' Practical Solutions to Identification Problems and Signature Problems Crypto 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.O. Goldreich, Two Remarks Concerning the GMR Signature Scheme, Crypto 86.Google ScholarGoogle Scholar
  9. 9.O. Goldreich, H. Krawczyk and M. Luby, On the existence of Pseudorandom Generators, Proceedings of the 29th Symposium on the Foundation of Computer Science, 1988, pp. 12-24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.S. Goldreich, S. Micali and A. Wigderson, Proofs that Yields Nothing But their Validity, and a Methodology of Cryptographic Protocol Design, Proceedings of the 27th Symposium on the Foundation of Computer Science, 1986, pp. 174-187.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.S. Goldwasser and S. Micali, Probabilistic Encryption, J. Com. Sys. Sci. 28 (1984), pp. 270- 299.Google ScholarGoogle ScholarCross RefCross Ref
  12. 12.S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof- Systems, Proc. 17th Annual Symposium on the Theory of Computing, Providence RI,, 1985, pp. 291-304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.S. Goldwasser, S. Micali and R. Rivest, A secure digital signature scheme , Siam Journal on Computing, Vol. 17, 2 (1988), pp. 281-308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.S. Goldwasser, S. Micali and A. C. Yao, Strong signature schemes , Proc. 15th Annual Symposium on the Theory of Computing, Boston, Ma, 1983, pp. 431-439. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.R. Impagliazzo, L. Levin and M. Luby, Pseudo. random Generation given from a One-way Function, These Proc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.R. Impagliazzo and M. Naor, Efficient Cryptographic Schemes Provably as Secure as Subset Sum, Manuscript.Google ScholarGoogle Scholar
  17. 17.R. Impagliazzo and S. Rudich, Limits on the Provable Consequences of One-way Permutations, These Proc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.R. Impagliazzo and M. Yung, Direct Minimum- Knowledge Computations , Proc. of Crypto 87, Springer Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.L. Lamport, Constructing digital signatures from one-way functions, SRI intl. CSL-98, October 1979.Google ScholarGoogle Scholar
  20. 20.L. Levin, One-way Functions and Pseudorandom Generators, Proc. 17th Annual Symposium on the Theory of Computing, 1985, pp. 363-365. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.R. Merkle, A Digital Signature based on Conventional Encryption Function, Crypto 1987, Springer Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.R. Merkle, Secrecy, Authentication and Public Key Systems, Ph.D. Thesis (1982), UMI Research Press, Ann Arbor, Michigan. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.R. Merkle, A Certified Digital Signature, Manuscript 1979.Google ScholarGoogle Scholar
  24. 24.R. Merkle and M. Hellman, Hiding Information and Signature in Trapdoor Knapsack, IEEE Trans. on Information Theory, vol. IT-24, 5 (1978), pp. 525-530.Google ScholarGoogle Scholar
  25. 25.M. O. Rabin digitalized signatures , in Foundation of Secure Computation, Academic Press, R.A. DeMillo, D. Dobkin, A. Jones and R. Lipton, eds., Academic Press, 1977.Google ScholarGoogle Scholar
  26. 26.M. O. Rabin Fingerprinting by Random Polynomials , Harvard University, TR-15-81, 1981.Google ScholarGoogle Scholar
  27. 27.M. O. Rabin Digital Signatures and Public Key Functions as Intractable as Factoring, Technical Memo TM-212, Lab. for Computer Science, MIT, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. 28.R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Comm. of ACM, 21 (1978), pp. 120-126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. 29.A. Shamir, On the Generation of Cryptographically Strong Pseudo-Random Number Sequences, ACM Trans. Comput. Sys., I (1983), pp. 38-44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30.M. N. Wegman and J. L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences 22, pp. 265-279 (1981).Google ScholarGoogle ScholarCross RefCross Ref
  31. 31.A. C. Yao, Theory and Applications of Trapdoor functions, Proceedings of the 23th Symposiuin on the Foundation of Computer Science, 1982, pp. 80-91.Google ScholarGoogle Scholar

Index Terms

  1. Universal one-way hash functions and their cryptographic applications

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing
                February 1989
                600 pages
                ISBN:0897913078
                DOI:10.1145/73007

                Copyright © 1989 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 February 1989

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                STOC '89 Paper Acceptance Rate56of196submissions,29%Overall Acceptance Rate1,469of4,586submissions,32%

                Upcoming Conference

                STOC '24
                56th Annual ACM Symposium on Theory of Computing (STOC 2024)
                June 24 - 28, 2024
                Vancouver , BC , Canada

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader