Īµ-Almost collision-flat universal hash functions and mosaics of designs

06/07/2023
āˆ™
by   Moritz Wiese, et al.
āˆ™
0
āˆ™

We introduce, motivate and study Īµ-almost collision-flat (ACFU) universal hash functions f:š’³Ć—š’®ā†’š’œ. Their main property is that the number of collisions in any given value is bounded. Each Īµ-ACFU hash function is an Īµ-almost universal (AU) hash function, and every Īµ-almost strongly universal (ASU) hash function is an Īµ-ACFU hash function. We study how the size of the seed set š’® depends on Īµ,|š’³| and |š’œ|. Depending on how these parameters are interrelated, seed-minimizing ACFU hash functions are equivalent to mosaics of balanced incomplete block designs (BIBDs) or to duals of mosaics of quasi-symmetric block designs; in a third case, mosaics of transversal designs and nets yield seed-optimal ACFU hash functions, but a full characterization is missing. By either extending š’® or š’³, it is possible to obtain an Īµ-ACFU hash function from an Īµ-AU hash function or an Īµ-ASU hash function, generalizing the construction of mosaics of designs from a given resolvable design (Gnilke, Greferath, Pavčević, Des. Codes Cryptogr. 86(1)). The concatenation of an ASU and an ACFU hash function again yields an ACFU hash function. Finally, we motivate ACFU hash functions by their applicability in privacy amplification.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
āˆ™ 08/30/2023

Cryptanalysis of a Cayley Hash Function Based on Affine Maps in one Variable over a Finite Field

Cayley hash functions are cryptographic hashes constructed from Cayley g...
research
āˆ™ 04/30/2021

Compactness of Hashing Modes and Efficiency beyond Merkle Tree

We revisit the classical problem of designing optimally efficient crypto...
research
āˆ™ 10/12/2020

MMH* with arbitrary modulus is always almost-universal

Universal hash functions, discovered by Carter and Wegman in 1979, are o...
research
āˆ™ 11/17/2022

MiftyCoin (MFT): A Cryptocurrency Mined with Proof of Human Work

We present in this paper a cryptocurrency called Mobile Fungible Token (...
research
āˆ™ 08/20/2018

PPP-Completeness with Connections to Cryptography

Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP w...
research
āˆ™ 05/30/2023

Methods for Collisions in Some Algebraic Hash Functions

This paper focuses on devising methods for producing collisions in algeb...
research
āˆ™ 08/31/2018

A Formula That Generates Hash Collisions

We present an explicit formula that produces hash collisions for the Mer...

Please sign up or login with your details

Forgot password? Click here to reset