{"title":"Extending second-preimage-resistant-like compress functions to XOR-based target collision resistant hash functions","authors":"Lingyun Li, Guang-liang Liu, Quanke Pan","doi":"10.1109/ICIME.2010.5477751","DOIUrl":null,"url":null,"abstract":"The XOR-based method put forth by Bellare and Rogaway, and later improved by Shoup, is wildly used to construct target collision resistant hash functions. We consider the relationship between XOR-based target collision resistant hash functions and second preimage resistant compress functions. The contributions of this paper are twofold. First, we present the variants of evaluated second preimage resistant property, called e'-SPR. Second, we prove that the e'-SPR property of compress functions suffice to ensure the XOR-based hash functions target resistant to collision. More generic, we prove that other second preimage resistant properties, such as the r-SPR and c-SPR can achieve this goal as well.","PeriodicalId":382705,"journal":{"name":"2010 2nd IEEE International Conference on Information Management and Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd IEEE International Conference on Information Management and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIME.2010.5477751","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The XOR-based method put forth by Bellare and Rogaway, and later improved by Shoup, is wildly used to construct target collision resistant hash functions. We consider the relationship between XOR-based target collision resistant hash functions and second preimage resistant compress functions. The contributions of this paper are twofold. First, we present the variants of evaluated second preimage resistant property, called e'-SPR. Second, we prove that the e'-SPR property of compress functions suffice to ensure the XOR-based hash functions target resistant to collision. More generic, we prove that other second preimage resistant properties, such as the r-SPR and c-SPR can achieve this goal as well.