DocumentCode :
2546785
Title :
Extending second-preimage-resistant-like compress functions to XOR-based target collision resistant hash functions
Author :
Li, Lingyun ; Liu, Guangliang ; Pan, Quanke
Author_Institution :
Sch. of Comput. Sci., Liaocheng Univ., Liaocheng, China
fYear :
2010
fDate :
16-18 April 2010
Firstpage :
444
Lastpage :
448
Abstract :
The XOR-based method put forth by Bellare and Rogaway, and later improved by Shoup, is wildly used to construct target collision resistant hash functions. We consider the relationship between XOR-based target collision resistant hash functions and second preimage resistant compress functions. The contributions of this paper are twofold. First, we present the variants of evaluated second preimage resistant property, called e´-SPR. Second, we prove that the e´-SPR property of compress functions suffice to ensure the XOR-based hash functions target resistant to collision. More generic, we prove that other second preimage resistant properties, such as the r-SPR and c-SPR can achieve this goal as well.
Keywords :
cryptography; data compression; image coding; XOR-based target collision resistant hash functions; domain extension; second-preimage-resistant-like compress functions; Chromium; Computer science; Cryptography; XOR; domain extension; hash; second preimage resistant; target collision resistant;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Management and Engineering (ICIME), 2010 The 2nd IEEE International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-5263-7
Electronic_ISBN :
978-1-4244-5265-1
Type :
conf
DOI :
10.1109/ICIME.2010.5477751
Filename :
5477751
Link To Document :
بازگشت