Lossy projective hashing and its applications
In this paper, we introduce a primitive called lossy projective hashing. It is unknown before whether smooth projective hashing (Cramer-Shoup, Eurocrypt’02) can be constructed from dual projective hashing (Wee, Eurocrypt’12). The lossy projective hashing builds a bridge between dual projective hashi...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9194 https://ink.library.smu.edu.sg/context/sis_research/article/10199/viewcontent/lossy_projective.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-10199 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-101992024-08-13T05:14:06Z Lossy projective hashing and its applications XUE, Haiyang LIU, Yamin LU, Xianhui LI, Bao In this paper, we introduce a primitive called lossy projective hashing. It is unknown before whether smooth projective hashing (Cramer-Shoup, Eurocrypt’02) can be constructed from dual projective hashing (Wee, Eurocrypt’12). The lossy projective hashing builds a bridge between dual projective hashing and smooth projective hashing. We give instantiations of lossy projective hashing from DDH, DCR, QR and general subgroup membership assumptions (including 2k-th residue, p-subgroup and higher residue assumptions). We also show how to construct lossy encryption and fully IND secure deterministic public key encryption from lossy projective hashing. – We give a construction of lossy projective hashing via dual projective hashing. We prove that lossy projective hashing can be converted to smooth projective hashing via pairwise independent hash functions, which in turn yields smooth projective hashing from dual projective hashing. – We propose a direct construction of lossy encryption via lossy projective hashing. Our construction is different from that given by Hemenway et al. (Eurocrypt 2011) via smooth projective hashing. In addition, we give a fully IND secure deterministic public key encryption via lossy projective hashing and one round UCE secure hash functions recently introduced by Bellare et al. (Crypto 2013). 2015-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9194 info:doi/10.1007/978-3-319-26617-6_4 https://ink.library.smu.edu.sg/context/sis_research/article/10199/viewcontent/lossy_projective.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Lossy projective hashing Dual projective hashing Smooth projective hashing Lossy encryption Deterministic public key encryption Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Lossy projective hashing Dual projective hashing Smooth projective hashing Lossy encryption Deterministic public key encryption Information Security |
spellingShingle |
Lossy projective hashing Dual projective hashing Smooth projective hashing Lossy encryption Deterministic public key encryption Information Security XUE, Haiyang LIU, Yamin LU, Xianhui LI, Bao Lossy projective hashing and its applications |
description |
In this paper, we introduce a primitive called lossy projective hashing. It is unknown before whether smooth projective hashing (Cramer-Shoup, Eurocrypt’02) can be constructed from dual projective hashing (Wee, Eurocrypt’12). The lossy projective hashing builds a bridge between dual projective hashing and smooth projective hashing. We give instantiations of lossy projective hashing from DDH, DCR, QR and general subgroup membership assumptions (including 2k-th residue, p-subgroup and higher residue assumptions). We also show how to construct lossy encryption and fully IND secure deterministic public key encryption from lossy projective hashing. – We give a construction of lossy projective hashing via dual projective hashing. We prove that lossy projective hashing can be converted to smooth projective hashing via pairwise independent hash functions, which in turn yields smooth projective hashing from dual projective hashing. – We propose a direct construction of lossy encryption via lossy projective hashing. Our construction is different from that given by Hemenway et al. (Eurocrypt 2011) via smooth projective hashing. In addition, we give a fully IND secure deterministic public key encryption via lossy projective hashing and one round UCE secure hash functions recently introduced by Bellare et al. (Crypto 2013). |
format |
text |
author |
XUE, Haiyang LIU, Yamin LU, Xianhui LI, Bao |
author_facet |
XUE, Haiyang LIU, Yamin LU, Xianhui LI, Bao |
author_sort |
XUE, Haiyang |
title |
Lossy projective hashing and its applications |
title_short |
Lossy projective hashing and its applications |
title_full |
Lossy projective hashing and its applications |
title_fullStr |
Lossy projective hashing and its applications |
title_full_unstemmed |
Lossy projective hashing and its applications |
title_sort |
lossy projective hashing and its applications |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2015 |
url |
https://ink.library.smu.edu.sg/sis_research/9194 https://ink.library.smu.edu.sg/context/sis_research/article/10199/viewcontent/lossy_projective.pdf |
_version_ |
1814047787542642688 |