Abstract
We study homomorphic hash functions into SL 2(q) , the 2 × 2 matrices with determinant 1 over the field with q elements. Modulo a well supported number theoretic hypothesis, which holds in particular for concrete homomorphisms proposed thus far, we provide a worst case to average case reduction for these hash functions: upto a logarithmic factor, a random homomorphism is as secure as any concrete homomorphism. For a family of homomorphisms containing several concrete proposals in the literature, we prove that collisions of length O(log q) can be found in running time O(q). For general homomorphisms we offer an algorithm that, heuristically and according to experiments, in running time O(q) finds collisions of length O(log q) for q even, and length O(log 2q/ log log q) for arbitrary q. While exponetial time, our algorithms are faster in practice than all earlier generic algorithms, and produce much shorter collisions.
Original language | English |
---|---|
Pages (from-to) | 83-107 |
Number of pages | 25 |
Journal | Designs, Codes, and Cryptography |
Volume | 81 |
Issue number | 1 |
DOIs | |
State | Published - 1 Oct 2016 |
Keywords
- Cayley hash function
- Expander graphs
- Homomorphic hash function
- SL hash
- Tillich–Zémor hash
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Computer Science Applications
- Discrete Mathematics and Combinatorics
- Applied Mathematics