Abstract
We provide some guidelines for deriving new projective hash families of cryptographic interest. Our main building blocks are so called group action systems; we explore what properties of these mathematical primitives may lead to the construction of cryptographically useful projective hash families. We point out different directions towards new constructions, deviating from known proposals arising from Cramer and Shoup’s seminal work.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bonisoli, J.: On collineation groups of finite planes. Lecture notes from the course Finite Geometries and Their Applications Available at http://www.maths.qmul.ac.uk/~pjc/design/notes.html 1–27, (1999)
Cramer, R., Shoup, V.: A practical public key cryptosystem secure against adaptive chosen ciphertext attacks. Advances in Cryptology—CRYPTO’98, Lecture Notes in Computer Science, vol. 1462, pp. 424–441. Springer, Heidelberg (1998)
Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. Cryptology ePrint Archive: Report 2001/085 (2001). Electronically available at http://eprint.iacr.org/2001/085/
Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. Advances in Cryptology—EUROCRYPT 2002, Lecture Notes in Computer Science, vol. 2332, pp. 45–64. Springer, Heidelberg (2002)
Carter J. and Wegman W. (1979). Universal classes of hash functions. J. Comput. Syst. Sci. 18: 143–154
Goldreich O. (2001). Foundations of Cryptography, vol. 1. Cambridge University Press, London
Goldreich O. (2004). Foundations of Cryptography, vol. 2. Cambridge University Press, London
Impagliazo, R., Levin, L.A., Luby, A.: Pseudorandom Generators from any One-Way Function. In: 21st STOC, Proceedings, pp. 12–24. Springer, Heidelberg (1989)
Kalai, Y.I.: Smooth Projective Hashing and Two-Message Oblivious Transfer. In: Advances in Cryptology. Proceedings of EUROCRYPT 2005, Lecture Notes in Computer Science, vol. 3494, pp. 78–95. Springer, Heidelberg (2005)
Kurosawa, K., Desmedt, Y.: A New Paradim of Hybrid Encryption Scheme. In: Advances in Cryptology. Proceedings of CRYPTO 2004, Lecture Notes in Computer Science, vol. 3152. pp. 426–442. Springer, Heidelberg (2004)
Naor, M., Yung, M.: Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In: Proceedings of the twenty-second annual ACM symposium on Theory of computing, pp. 427–437. ACM Press, New York (1990)
Rotman J.J. (1999). An Introduction to the Theory of Groups, 4th ed. Springer, Heidelberg
González Vasco, M.I., Martínez, C., Steinwandt, R., Villar, J.L.: A new Cramer-Shoup like methodology for group based provable secure encryption schemes. In: Proceedings of the Second Theory of Cryptography Conference TCC 2005, Lecture Notes in Computer Science, vol. 3378, pp. 495–509. Springer, Heidelberg (2005)
Gennaro, R., Lindell, Y.: A Framewok for Passord-Based Authenticated Key Exchange. Cryptology ePrint Archive: Report 2003/032 (2003). Electronically available at http://eprint.iacr.org/2003/032/
Gennaro, R., Shoup, V.: A Note on an Encryption Scheme of Kurosawa and Desmedt. Cryptology ePrint Archive: Report 2004/194 (2004). Electronically available at http://eprint.iacr.org/2004/194/
Author information
Authors and Affiliations
Corresponding author
Additional information
Part of this research was done while the authors visited the Centre de Recerca Matemàtica on the occasion of the Research Program on Contemporary Cryptology (Spring 2005).
Rights and permissions
About this article
Cite this article
González Vasco, M.I., Villar, J.L. In search of mathematical primitives for deriving universal projective hash families. AAECC 19, 161–173 (2008). https://doi.org/10.1007/s00200-008-0068-y
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00200-008-0068-y