期刊文献+

基于单向函数的伪随机产生器与通用单向哈希函数 被引量:5

One-way function based pseudorandom generator and universal one-way hash function
下载PDF
导出
摘要 重点回顾基于单向函数的伪随机产生器,以及通用单向哈希函数的研究现状,介绍相关研究的最新进展,并对通用单向哈希函数设计方法给出系统性阐述。单向函数蕴涵伪随机产生器是密码学中的基础问题,是现代密码学的基础。单向函数可以用来构造伪随机产生器进而构成流密码算法,或是在伪随机产生器的基础上进一步构造伪随机函数和伪随机置换从而用作分组加密算法。随机迭代技术被提出并经精练后,可用于基于规则单向函数的伪随机产生器设计。单向函数蕴涵通用单向哈希函数是现代密码学最核心的基础理论之一。关于通用单向哈希函数可以基于任意单向函数构造而来。通用单向哈希函数的应用包括基于最小假设的数字签名、Cramer-Shoup加密体制、统计隐藏承诺体制等。 A survey is given to revisit the problem of basing pseudorandom generators on one-way functions,and the state of the art on universal one-way hash functions from one-way functions is reviewd.That one-way functions(OWFs)imply pseudorandom generators(PRGs)is one of the central results upon which modern cryptography is successfully founded. "The randomized iterate"technique is originally used and refined in constructing PRGs from regular OWFs.The seminal result that one-way functions(OWF)imply universal one-way hash functions(UOWHFs)constitutes one of the central pieces of modern cryptography.The principle possibility result is that UOWHFs can be based on any OWF.Applications of UOWHFs include basing digital signatures on minimal assumptions(one-way functions),Cramer-Shoup encryption scheme,statistically hiding commitment scheme,etc.
作者 郁昱 李祥学
出处 《西安邮电大学学报》 2016年第2期1-11,共11页 Journal of Xi’an University of Posts and Telecommunications
基金 国家自然科学基金资助项目(61472249 61572192 61572149)
关键词 密码学 单向函数 伪随机产生器 通用单向哈希函数 cryptology one-way function pseudorandom generator universal one-way Hash function
  • 相关文献

参考文献45

  • 1HASTAD J,IMPAGLIAZZO R,LEVIN L A,et al.Construction of a pseudo-random generator from any one-way function[J/OL].SIAM Journal on Computing,1995,28(4):12-24[2015-11-12].http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.7957.
  • 2BLUM M,MICALI S.How to generate cryptographically strong sequences of pseudorandom bits[J/OL].SIAM Journal on Computing,1984,13(4):850-864[2015-11-12].http://epubs.siam.org/doi/pdf/10.1137/0213053.
  • 3YAO A C C.Theory and applications of trapdoor functions(extended abstract)[C]//Proceedings of the23rd IEEE Symposium on Foundation of Computer Science.Chicago:IEEE,1982:80-91.
  • 4GOLDREICH O,LEVIN L A.A hard-core predicate for all one-way functions[C]//STOC’89Proceedings of the twenty-first annual ACM symposium on Theory of computing.New York:ACM,1989:25-32.DOI:10.1145/73007.73010.
  • 5DODIS Y,ELBAZ A,OLIVEIRA R,et al..Improved randomness extraction from two independent sources[C]//Approximation,Randomization,and Combinatorial Optimization.Algorithms and Techniques.Berlin:Springer-Verlag,2004:334-344.DOI:10.1007/978-3-540-27821-4_30.
  • 6CARTER J L,WEGMAN M N.Universal classes of Hash functions[J].Journal of Computer and System Sciences,1979,18(2):143-154.
  • 7LEE C J,LU C J,TSAI S C,et al.Extracting randomness from multiple independent sources[J].IEEE Transactions on Information Theory,2005,51(6):2224-2227.
  • 8STINSON D R.Universal Hash families and the leftover Hash lemma,and applications to cryptography and computing[J/OL].Journal of Combinatorial Mathematics and Combinatorial Computing,2002,42:3-31[2015-11-15].http://cacr.uwaterloo.ca/~dstinson/papers/leftoverhash.pdf.
  • 9GOLDREICH O.Three XOR-lemmas:an exposition[C]//Studies in Complexity and Cryptography.Miscellanea on the Interplay between Randomness and Computation.Berlin:Springer-Verlag,2011:248-272.DOI:10.1007/978-3-642-22670-0_22.
  • 10GOLDREICH O.Foundations of Cryptography:Basic Tools[M/OL].New York:Cambridge University Press,2001[2015-11-13].http://office-for.com/lib/etc/crypto_2001.pdf.

同被引文献19

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部