会议专题

The Implications Between C-SPR and CRn (n,n) Visited

  The compression function is wildly used via many kinds of iterations in the construction of the modern hash function intended for use with standard digital signatures following the hash-and-sign mode.Some variants of secondpreimage resistance(SPR)1 assumptions of the keyless compression function,called c-SPR,r-SPR and e-SPR,have been put forth by Halevi and Krawczyk2,in order to obtain higher security properties for the dedicated-key hash function by iteration.In this paper,we compare one variant,called c-SPR,with CRn (n,n) which has been raised by Mironov3.We give several different schemes of the dedicated-key compression functions firstly,the relations between c-SPR and CRn (n,n) differ in different schemes.In the second part of this paper,we provide a full picture of the relations between c-SPR and CRn (n,n),and give the additional restrictions that ensure c-SPR of the keyless compression function to be the necessary or sufficient conditions of CRn (n,n) of the dedicated-key compression function separately.

c-SPR CRn (n,n) commpression function hash function demain extension

Lingyun Li Junqing Li Shengxian Xie Huishan Yu

School of Computer Science Liaocheng University Liaocheng, China

国际会议

2012 IEEE 14th International Conference on Communication Technology(2012年第十四届通信技术国际会议(ICCT 2012))

成都

英文

891-895

2012-11-09(万方平台首次上网日期,不代表论文的发表时间)