This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs, which also obtains better efficiency and security. The construction exploits a strong connection to the recently introduced notion of inaccessible entropy (Haitner et al. STOC 2009). With this perspective, we observe that a small tweak of any one-way function f is already a weak form of a UOWHF: Consider F (x, i) that outputs the i-bit long prefix of f (x). If F were a UOWHF then given a random x and i it would be hard to come up with x′ = x such that F (x, i) = F (x′ , i). While this may not be the case, we show (rather easily) that it is hard to sample x′ with almost...
We provide a characterization of pseudoentropy in terms of hardness of sampling: Let (X,B) be jointl...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
Over the last few years, there has been a surge of new cryptographic results, including Laconic obli...
(Article begins on next page) The Harvard community has made this article openly available. Please s...
A universal one-way hash function (UOWHF) is a compressing function for which finding a second preim...
A fundamental result in cryptography is that a digital signature scheme can be constructed from an a...
We give a new construction of pseudorandom generators from any one-way function. The construction ac...
A central result in the theory of Cryptography, by Hastad, Imagliazzo, Luby and Levin [SICOMP’99], d...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
AbstractWe present a binary tree based parallel algorithm for extending the domain of a universal on...
Abstract. We provide the first standard model construction for a powerful class of Universal Computa...
Lossy trapdoor functions, introduced by Peikert and Waters (STOC \u2708), can be initialized in one ...
In recent years, leakage-resilient cryptography---the design of cryptographic protocols resilient to...
We investigate the power of physical unclonable functions (PUFs) as a new primitive in cryptographic...
A family of one-way functions is extractable if given a random function in the family, an efficient ...
We provide a characterization of pseudoentropy in terms of hardness of sampling: Let (X,B) be jointl...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
Over the last few years, there has been a surge of new cryptographic results, including Laconic obli...
(Article begins on next page) The Harvard community has made this article openly available. Please s...
A universal one-way hash function (UOWHF) is a compressing function for which finding a second preim...
A fundamental result in cryptography is that a digital signature scheme can be constructed from an a...
We give a new construction of pseudorandom generators from any one-way function. The construction ac...
A central result in the theory of Cryptography, by Hastad, Imagliazzo, Luby and Levin [SICOMP’99], d...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
AbstractWe present a binary tree based parallel algorithm for extending the domain of a universal on...
Abstract. We provide the first standard model construction for a powerful class of Universal Computa...
Lossy trapdoor functions, introduced by Peikert and Waters (STOC \u2708), can be initialized in one ...
In recent years, leakage-resilient cryptography---the design of cryptographic protocols resilient to...
We investigate the power of physical unclonable functions (PUFs) as a new primitive in cryptographic...
A family of one-way functions is extractable if given a random function in the family, an efficient ...
We provide a characterization of pseudoentropy in terms of hardness of sampling: Let (X,B) be jointl...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
Over the last few years, there has been a surge of new cryptographic results, including Laconic obli...