Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$
- URL: http://arxiv.org/abs/2207.03987v3
- Date: Thu, 22 Aug 2024 19:32:01 GMT
- Title: Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$
- Authors: Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, Delaram Kahrobaei,
- Abstract summary: We define new families of Tillich-Z'emor hash functions, using higher dimensional special linear groups over finite fields as platforms.
Cayley graphs of these groups combine fast mixing properties and high girth, which together give rise to good preimage and collision resistance of the corresponding hash functions.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We define new families of Tillich-Z\'emor hash functions, using higher dimensional special linear groups over finite fields as platforms. The Cayley graphs of these groups combine fast mixing properties and high girth, which together give rise to good preimage and collision resistance of the corresponding hash functions. We justify the claim that the resulting hash functions are post-quantum secure.
Related papers
- Rényi divergence-based uniformity guarantees for $k$-universal hash functions [59.90381090395222]
Universal hash functions map the output of a source to random strings over a finite alphabet.
We show that it is possible to distill random bits that are nearly uniform, as measured by min-entropy.
arXiv Detail & Related papers (2024-10-21T19:37:35Z) - Fully Quantum Hash Function [3.2923780772605604]
We introduce a novel, textitfully quantum hash (FQH) function within the quantum walk on a cycle framework.
FQH requires minimal quantum resources to produce a large hash value, providing security against the birthday attack.
arXiv Detail & Related papers (2024-08-07T10:28:32Z) - Cryptanalysis of a Cayley Hash Function Based on Affine Maps in one Variable over a Finite Field [0.0]
Cayley hash functions are cryptographic hashes constructed from Cayley graphs of groups.
The hash function proposed by Shpilrain and Sosnovski, based on linear functions over a finite field, was proven insecure.
This paper shows that the proposal by Ghaffari and Mostmaghi that uses the hash in its construction is also insecure.
arXiv Detail & Related papers (2023-08-30T05:13:55Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - A Lower Bound of Hash Codes' Performance [122.88252443695492]
In this paper, we prove that inter-class distinctiveness and intra-class compactness among hash codes determine the lower bound of hash codes' performance.
We then propose a surrogate model to fully exploit the above objective by estimating the posterior of hash codes and controlling it, which results in a low-bias optimization.
By testing on a series of hash-models, we obtain performance improvements among all of them, with an up to $26.5%$ increase in mean Average Precision and an up to $20.5%$ increase in accuracy.
arXiv Detail & Related papers (2022-10-12T03:30:56Z) - Controlled Alternate Quantum Walk based Block Hash Function [14.540996187637523]
Controlled quantum walk based hash function is a kind of novel hash function, which is safe, flexible, high-efficient, and compatible.
To process message in batch amounts, in this paper, controlled alternate quantum walk based block hash function is presented.
arXiv Detail & Related papers (2022-05-12T09:42:17Z) - PHPQ: Pyramid Hybrid Pooling Quantization for Efficient Fine-Grained
Image Retrieval [68.05570413133462]
We propose a Pyramid Hybrid Pooling Quantization (PHPQ) module to capture and preserve fine-grained semantic information from multi-level features.
Experiments on two widely-used public benchmarks, CUB-200-2011 and Stanford Dogs, demonstrate that PHPQ outperforms state-of-the-art methods.
arXiv Detail & Related papers (2021-09-11T07:21:02Z) - Quantum collision finding for homomorphic hash functions [0.0]
We present concrete attack examples to provable hash functions, including a preimage attack to $oplus$-linear hash functions.
Hash functions which are additive or multiplicative are vulnerable to a quantum attack using the hidden subgroup problem algorithm for quantum computers.
arXiv Detail & Related papers (2021-07-30T23:01:02Z) - Additive Feature Hashing [0.0]
We show that additive feature hashing can be performed directly by adding the hash values and converting them into high-dimensional numerical vectors.
We show that the performance of additive feature hashing is similar to the hashing trick, and we illustrate the results numerically using synthetic, language recognition, and SMS spam detection data.
arXiv Detail & Related papers (2021-02-07T23:15:04Z) - Generative Semantic Hashing Enhanced via Boltzmann Machines [61.688380278649056]
Existing generative-hashing methods mostly assume a factorized form for the posterior distribution.
We propose to employ the distribution of Boltzmann machine as the retrievalal posterior.
We show that by effectively modeling correlations among different bits within a hash code, our model can achieve significant performance gains.
arXiv Detail & Related papers (2020-06-16T01:23:39Z) - Reinforcing Short-Length Hashing [61.75883795807109]
Existing methods have poor performance in retrieval using an extremely short-length hash code.
In this study, we propose a novel reinforcing short-length hashing (RSLH)
In this proposed RSLH, mutual reconstruction between the hash representation and semantic labels is performed to preserve the semantic information.
Experiments on three large-scale image benchmarks demonstrate the superior performance of RSLH under various short-length hashing scenarios.
arXiv Detail & Related papers (2020-04-24T02:23:52Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.