Combiners for Backdoored Random Oracles - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2018

Combiners for Backdoored Random Oracles

Résumé

We formulate and study the security of cryptographic hash functions in the backdoored random-oracle (BRO) model, whereby a big brother designs a "good" hash function, but can also see arbitrary functions of its table via backdoor capabilities. This model captures intentional (and unintentional) weaknesses due to the existence of collision-finding or inversion algorithms, but goes well beyond them by allowing, for example, to search for structured preimages. The latter can easily break constructions that are secure under random inversions. BROs make the task of bootstrapping cryptographic hardness somewhat challenging. Indeed, with only a single arbitrarily backdoored function no hardness can be bootstrapped as any construction can be inverted. However, when two (or more) independent hash functions are available, hardness emerges even with unrestricted and adaptive access to all backdoor oracles. At the core of our results lie new reductions from cryptographic problems to the communication complexities of various two-party tasks. Along the way we establish a communication complexity lower bound for set-intersection for cryptographically relevant ranges of parameters and distributions and where set-disjointness can be easy.
Fichier principal
Vignette du fichier
770.pdf (685.63 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01866724 , version 1 (03-09-2018)
hal-01866724 , version 2 (24-10-2018)

Identifiants

Citer

Balthazar Bauer, Pooya Farshim, Sogol Mazaheri. Combiners for Backdoored Random Oracles. Advances in Cryptology – CRYPTO 2018, Aug 2018, Santa Barbara, United States. ⟨10.1007/978-3-319-96881-0_10⟩. ⟨hal-01866724v2⟩
116 Consultations
276 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More