Quantum security of subset cover problems

10/27/2022
by   Samuel Bouaziz--Ermann, et al.
0

The subset cover problem for k ≥ 1 hash functions, which can be seen as an extension of the collision problem, was introduced in 2002 by Reyzin and Reyzin to analyse the security of their hash-function based signature scheme HORS. The security of many hash-based signature schemes relies on this problem or a variant of this problem (e.g. HORS, SPHINCS, SPHINCS+, …). Recently, Yuan, Tibouchi and Abe (2022) introduced a variant to the subset cover problem, called restricted subset cover, and proposed a quantum algorithm for this problem. In this work, we prove that any quantum algorithm needs to make Ω(k^-2^k-1/2^k-1· N^2^k-1-1/2^k-1) queries to the underlying hash functions to solve the restricted subset cover problem, which essentially matches the query complexity of the algorithm proposed by Yuan, Tibouchi and Abe. We also analyze the security of the general (r,k)-subset cover problem, which is the underlying problem that implies the unforgeability of HORS under a r-chosen message attack (for r ≥ 1). We prove that a generic quantum algorithm needs to make Ω(N^k/5) queries to the underlying hash functions to find a (1,k)-subset cover. We also propose a quantum algorithm that finds a (r,k)-subset cover making O(N^k/(2+2r)) queries to the k hash functions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/30/2021

Quantum collision finding for homomorphic hash functions

Hash functions are a basic cryptographic primitive. Certain hash functio...
research
02/18/2020

Security analysis of the W-OTS^+ signature scheme: Updating security bounds

In this work, we discuss in detail a flaw in the original security proof...
research
02/23/2019

Quantum security of hash functions and property-preservation of iterated hashing

This work contains two major parts: comprehensively studying the securit...
research
02/22/2022

Applying Grover's Algorithm to Hash Functions: A Software Perspective

Quantum software frameworks provide software engineers with the tools to...
research
09/09/2022

Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone

Oblivious Transfer (OT) is a major primitive for secure multiparty compu...
research
08/10/2023

Quantum-inspired Hash Function Based on Parity-dependent Quantum Walks with Memory

In this paper, we develop a generic controlled alternate quantum walk mo...
research
05/04/2021

Hardness-Preserving Reductions via Cuckoo Hashing

The focus of this work is hardness-preserving transformations of somewha...

Please sign up or login with your details

Forgot password? Click here to reset