Hardness-Preserving Reductions via Cuckoo Hashing

05/04/2021
by   Itay Berman, et al.
0

The focus of this work is hardness-preserving transformations of somewhat limited pseudorandom functions families (PRFs) into ones with more versatile characteristics. Consider the problem of domain extension of pseudorandom functions: given a PRF that takes as input elements of some domain U, we would like to come up with a PRF over a larger domain. Can we do it with little work and without significantly impacting the security of the system? One approach is to first hash the larger domain into the smaller one and then apply the original PRF. Such a reduction, however, is vulnerable to a "birthday attack": after √(U) queries to the resulting PRF, a collision (two distinct inputs having the same hash value) is very likely to occur. As a consequence, the resulting PRF is insecure against an attacker making this number of queries. In this work we show how to go beyond the aforementioned birthday attack barrier by replacing the above simple hashing approach with a variant of cuckoo hashing, a hashing paradigm that resolves collisions in a table by using two hash functions and two tables, cleverly assigning each element to one of the two tables. We use this approach to obtain: (i) a domain extension method that requires just two calls to the original PRF, can withstand as many queries as the original domain size, and has a distinguishing probability that is exponentially small in the amount of non-cryptographic work; and (ii) a security-preserving reduction from non-adaptive to adaptive PRFs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/30/2021

Quantum collision finding for homomorphic hash functions

Hash functions are a basic cryptographic primitive. Certain hash functio...
research
11/18/2020

Adversarial collision attacks on image hashing functions

Hashing images with a perceptual algorithm is a common approach to solvi...
research
07/03/2022

Tricking the Hashing Trick: A Tight Lower Bound on the Robustness of CountSketch to Adaptive Inputs

CountSketch and Feature Hashing (the "hashing trick") are popular random...
research
08/14/2018

Hashing with Linear Probing and Referential Integrity

We describe a variant of linear probing hash tables that never moves ele...
research
04/30/2021

Compactness of Hashing Modes and Efficiency beyond Merkle Tree

We revisit the classical problem of designing optimally efficient crypto...
research
10/27/2022

Quantum security of subset cover problems

The subset cover problem for k ≥ 1 hash functions, which can be seen as ...
research
06/20/2023

Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications

Cuckoo hashing is a powerful primitive that enables storing items using ...

Please sign up or login with your details

Forgot password? Click here to reset