Programmable Hash Functions and Their Applications

  • Dennis Hofheinz
  • Eike Kiltz
Conference paper

DOI: 10.1007/978-3-540-85174-5_2

Volume 5157 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Hofheinz D., Kiltz E. (2008) Programmable Hash Functions and Their Applications. In: Wagner D. (eds) Advances in Cryptology – CRYPTO 2008. CRYPTO 2008. Lecture Notes in Computer Science, vol 5157. Springer, Berlin, Heidelberg

Abstract

We introduce a new information-theoretic primitive called programmable hash functions (PHFs). PHFs can be used to program the output of a hash function such that it contains solved or unsolved discrete logarithm instances with a certain probability. This is a technique originally used for security proofs in the random oracle model. We give a variety of standard model realizations of PHFs (with different parameters).

The programmability of PHFs make them a suitable tool to obtain black-box proofs of cryptographic protocols when considering adaptive attacks. We propose generic digital signature schemes from the strong RSA problem and from some hardness assumption on bilinear maps that can be instantiated with any PHF. Our schemes offer various improvements over known constructions. In particular, for a reasonable choice of parameters, we obtain short standard model digital signatures over bilinear maps.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Dennis Hofheinz
    • 1
  • Eike Kiltz
    • 1
  1. 1.Cryptology and Information Security Research Theme, CWIAmsterdamThe Netherlands