Abstract
We study the following two kinds of one-way hash functions: universal one-way hash functions (UOHs) and collision intractable hash functions (CIHs). The main property of the former is that given an initial-string x, it is computationally difficult to find a different string y that collides with x. And the main property of the latter is that it is computationally difficult to find a pair x ≠ y of strings such that x collides with y. Our main results are as follows. First we prove that UOHs with respect to initial-strings chosen arbitrarily exist if and only if UOHs with respect to initial-strings chosen uniformly at random exist. Then, as an application of the result, we show that UOHs with respect to initial-strings chosen arbitrarily can be constructed under a weaker assumption, the existence of one-way quasi-injections. Finally, we investigate relationships among various versions of one-way hash functions. We prove that some versions of one-way hash functions are strictly included in others by explicitly constructing hash functions that are one-way in the sense of the former but not in the sense of the latter.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
J. Balcázar, J. Díaz and J. Gabarró: Structural Complexity I, EATCS Monographs on Theoretical Computer Science, Springer-Verlag, Berlin, 1988.
J. Carter and M. Wegman: “Universal classes of hash functions”, Journal of Computer and System Sciences, Vol.18, 1979, pp.143–154.
I. Damgård: “Collision free hash functions and public key signature schemes”, Proceedings of EuroCrypt’87, 1987, pp.203–216.
I. Damgård: “A design principle for hash functions”, Presented at Crypto’89, 1989.
A. De Santis and M. Yung: “On the design of provably-secure cryptographic hash functions”, Presented at EuroCrypt’90, 1990.
R. Impagliazzo, L. Levin and M. Luby: “Pseudo-random generation from one-way functions”, Proceedings of the 21-th ACM Symposium on Theory of Computing, 1989, pp.12–24.
R. Karp and R. Lipton: “Turing machines that take advice”, L’enseigment Mathematique, Vol.28, 1982, pp.191–209.
R. Merkle: “One way hash functions and DES”, Presented at Crypto’89, 1989.
M. Naor and M. Yung: “Universal one-way hash functions and their cryptographic applications”, Proceedings of the 21-th ACM Symposium on Theory of Computing, 1989, pp.33–43.
N. Pippenger: “On simultaneous resource bounds”, Proceedings of the 20-th IEEE Symposium on the Foundations of Computer Science, 1979, pp.307–311.
J. Rompel: “One-way functions are necessary and sufficient for secure signatures”, Proceedings of the 22-nd ACM Symposium on Theory of Computing, 1990, pp.387–394.
O. Watanabe: “On one-way functions”, Presented at the International Symposium on Combinatorial Optimization, Tianjin, China, 1988.
M. Wegman and J. Carter: “New hash functions and their use in authentication and set equality”, Journal of Computer and System Sciences, Vol.22, 1981, pp.265–279.
A. Yao: “Theory and applications of trapdoor functions”, Proceedings of the 23-rd IEEE Symposium on the Foundations of Computer Science, 1982, pp.80–91.
Y. Zheng, T. Matsumoto and H. Imai: “Duality between two cryptographic primitives”, To be presented at 8-th International Conference on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC-8), Tokyo, August 1990. A preliminary version appears in IEICE Technical Reports on Information Security, TG ISEC89-46, March 16, 1990.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zheng, Y., Matsumoto, T., Imai, H. (1991). Structural Properties of One-Way Hash Functions. In: Menezes, A.J., Vanstone, S.A. (eds) Advances in Cryptology-CRYPTO’ 90. CRYPTO 1990. Lecture Notes in Computer Science, vol 537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_21
Download citation
DOI: https://doi.org/10.1007/3-540-38424-3_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54508-8
Online ISBN: 978-3-540-38424-3
eBook Packages: Springer Book Archive