TY - GEN
T1 - Correlation-Intractable Hash Functions via Shift-Hiding
AU - Lombardi, Alex
AU - Vaikuntanathan, Vinod
N1 - Publisher Copyright:
© Alex Lombardi and Vinod Vaikuntanathan; licensed under Creative Commons License CC-BY 4.0
PY - 2022/1/1
Y1 - 2022/1/1
N2 - A hash function family H is correlation intractable for a t-input relation R if, given a random function h chosen from H, it is hard to find x1,..., xt such that R(x1,..., xt, h(x1),..., h(xt)) is true. Among other applications, such hash functions are a crucial tool for instantiating the Fiat-Shamir heuristic in the plain model, including the only known NIZK for NP based on the learning with errors (LWE) problem (Peikert and Shiehian, CRYPTO 2019). We give a conceptually simple and generic construction of single-input CI hash functions from shift-hiding shiftable functions (Peikert and Shiehian, PKC 2018) satisfying an additional one-wayness property. This results in a clean abstract framework for instantiating CI, and also shows that a previously existing function family (PKC 2018) was already CI under the LWE assumption. In addition, our framework transparently generalizes to other settings, yielding new results: We show how to instantiate certain forms of multi-input CI under the LWE assumption. Prior constructions either relied on a very strong “brute-force-is-best” type of hardness assumption (Holmgren and Lombardi, FOCS 2018) or were restricted to “output-only” relations (Zhandry, CRYPTO 2016). We construct single-input CI hash functions from indistinguishability obfuscation (iO) and one-way permutations. Prior constructions relied essentially on variants of fully homomorphic encryption that are impossible to construct from such primitives. This result also generalizes to more expressive variants of multi-input CI under iO and additional standard assumptions.
AB - A hash function family H is correlation intractable for a t-input relation R if, given a random function h chosen from H, it is hard to find x1,..., xt such that R(x1,..., xt, h(x1),..., h(xt)) is true. Among other applications, such hash functions are a crucial tool for instantiating the Fiat-Shamir heuristic in the plain model, including the only known NIZK for NP based on the learning with errors (LWE) problem (Peikert and Shiehian, CRYPTO 2019). We give a conceptually simple and generic construction of single-input CI hash functions from shift-hiding shiftable functions (Peikert and Shiehian, PKC 2018) satisfying an additional one-wayness property. This results in a clean abstract framework for instantiating CI, and also shows that a previously existing function family (PKC 2018) was already CI under the LWE assumption. In addition, our framework transparently generalizes to other settings, yielding new results: We show how to instantiate certain forms of multi-input CI under the LWE assumption. Prior constructions either relied on a very strong “brute-force-is-best” type of hardness assumption (Holmgren and Lombardi, FOCS 2018) or were restricted to “output-only” relations (Zhandry, CRYPTO 2016). We construct single-input CI hash functions from indistinguishability obfuscation (iO) and one-way permutations. Prior constructions relied essentially on variants of fully homomorphic encryption that are impossible to construct from such primitives. This result also generalizes to more expressive variants of multi-input CI under iO and additional standard assumptions.
KW - Correlation intractability
KW - Cryptographic hash functions
UR - http://www.scopus.com/inward/record.url?scp=85124050261&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85124050261&partnerID=8YFLogxK
U2 - 10.4230/LIPIcs.ITCS.2022.102
DO - 10.4230/LIPIcs.ITCS.2022.102
M3 - Conference contribution
AN - SCOPUS:85124050261
T3 - Leibniz International Proceedings in Informatics, LIPIcs
BT - 13th Innovations in Theoretical Computer Science Conference, ITCS 2022
A2 - Braverman, Mark
PB - Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
T2 - 13th Innovations in Theoretical Computer Science Conference, ITCS 2022
Y2 - 31 January 2022 through 3 February 2022
ER -