Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.2.57

Construction of UOWHF: New Parallel Domain Extender with Optimal Key Size  

Wonil Lee (CIST, Korea University)
Donghoon Chang (CIST, Korea University)
Abstract
We present a new parallel algorithm for extending the domain of a UOWHF. Our algorithm is based on non-complete l-ary tree and has the same optimal key length expansion as Shoup's which has the most efficient key length expansion known so far. Using the recent result [8], we can also prove that the key length expansion of this algorithm and Shoup's sequential algorithm are the minimum possible for any algorithms in a large class of "natural" domain extending algorithms. But its prallelizability performance is less efficient than complete tree based constructions. However if l is getting larger then the parallelizability of the construction is also getting near to that of complete tree based constructions.tructions.
Keywords
UOWHF; hash function; masking assignment; sequential construction; parallel construction; tree based construction.;
Citations & Related Records
연도 인용수 순위
  • Reference
1 One way hash funtions and DES /
[ R.Merkle ] / Advances in Cryptology-Crypto'89, Lecture Notes in Computer Sciences
2 Universal one-way hash functions and their cryptographic applications /
[ M.Naor;M.Yung ] / Proceeding of the Twenty First Annual ACM Symposium on Theory of Computing
3 A design principle for hash functions /
[ I.B.Damgard ] / Advances in Cryptology-Crypto'89, Lecture Notes in Computer Sciences
4 Finding collisions on a one-way street:can secure hash functions be based on general assumptions? /
[ D.Simon ] / Advances in Cryptology-Eurocrypt'98, Lecture Notes in Computer Science
5 A composition theorem for universal one-way hash functions /
[ V.Shoup ] / Advances in Cryptology-Eurocrypt'00, Lecture Notes in Computer Science
6 A new Tree based Domain Extension of UOWHF /
[ M.Nandi ] / Cryptology ePrint Archive
7 Domain Extedders for UOWHF:A Generic Lower Bound on Key Expansion and a Finite Binary Tree Algorithm /
[ P.Sarkar ] / Cryptology eprint Archive
8 Collision-resistant hashing:towards making UOWHFs practical /
[ M.Bellard;P.Rogaway ] / Advances in Cryptology-Crypto'97, Lecture Notes in Computer Science
9 Hash functions:from Merkle-Damgard to Shoup /
[ I.Mironov ] / Advances in Cryptology-Eurocrypt'01, Lecture Notes in Computer Sciences
10 Construction of UOWHF:Tree Hashing Revisited /
[ P.Sarkar ] / Cryptology ePrint Archive