Programmable hash functions and their applications

39Citations
Citations of this article
79Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We introduce a new combinatorial primitive called programmable hash functions (PHFs). PHFs can be used to program the output of a hash function such that it contains solved or unsolved discrete logarithm instances with a certain probability. This is a technique originally used for security proofs in the random oracle model. We give a variety of standard model realizations of PHFs (with different parameters). The programmability makes PHFs a suitable tool to obtain black-box proofs of cryptographic protocols when considering adaptive attacks. We propose generic digital signature schemes from the strong RSA problem and from some hardness assumption on bilinear maps that can be instantiated with any PHF. Our schemes offer various improvements over known constructions. In particular, for a reasonable choice of parameters, we obtain short standard model digital signatures over bilinear maps. © International Association for Cryptologic Research 2011.

Cite

CITATION STYLE

APA

Hofheinz, D., & Kiltz, E. (2012). Programmable hash functions and their applications. Journal of Cryptology, 25(3), 484–527. https://doi.org/10.1007/s00145-011-9102-5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free