Questions tagged [universal-hash]
In mathematics and computing, universal hashing (in a randomized algorithm or data structure) refers to selecting a hash function at random from a family of hash functions with a certain mathematical property.
62 questions
0 votes
3 answers
156 views
Universal hash functions besides finite field multiplication
It seems to me that all that exists for universal hash functions used in Carter–Wegman MACs is finite field multiplication. Are there any others?
4 votes
0 answers
155 views
Is the NH hash family (from UMAC) AXU?
For any positive integer $k$, let $\boxplus_k$ be addition on $k$-bit unsigned integers and $\boxminus_k$ be subtraction on $k$-bit unsigned integers. Let $\operatorname{NH}_w((X,Y),(a,b)) = (a \...
1 vote
0 answers
49 views
Block-wise universal functions and their properties
Consider a function $h:\mathcal{K} \times X^n \to X^n$. The function $h$ is called $(\epsilon_1, \epsilon_2)$-block-wise almost uniform (BAU), if for all $(\mathbf{x},i)\ne(\mathbf{x}',i')$ the ...
5 votes
5 answers
1k views
Which hash algorithms support binary input of arbitrary bit length?
Background In theory, hash functions produce a binary number having bounded (often fixed) length from binary data of arbitrary length. In practice, specifications and implementations constrain the ...
1 vote
0 answers
49 views
Expected size of a set hashed to a specific value
In Theorem D.5 of Goldreich's Computational Complexity: A Conceptual Perspective, Goldreich states: Let $m \leq n$ be integers, $H_n^m$ be a family of pairwise independent hash functions, and $S \...
1 vote
0 answers
69 views
Proof of UOWHF construction from a strongly universal hash family
I am currently trying to rigorously prove Lemma 2.2 of [NY]. More specifically, a UOWHF family can be constructed from a composition of a strongly universal family $G_k = \{g : \{0, 1\}^k \rightarrow \...
2 votes
2 answers
209 views
What does the leftover hash lemma guarantee for a specific hash function?
Suppose I sample a matrix $h$ from $\mathbb{Z}_2^{l \times n}$ where each entry in $h$ is $1$ with probability 1/2. Suppose I also have a set $S\subset \{0,1\}^n$, and I define a random variable $X$ ...
3 votes
1 answer
884 views
What is the advantage of using hash function families instead of a single hash function?
My guess would be that families are more secure. In which way though? I have seen claims that hash function families can be collision resistant while single hash functions can not be. Is this true? ...
0 votes
1 answer
88 views
Is a PRF pairwise independently and uniformly distributed
The notation of a strongly universal function was introduced by Wegman and Carter here and it states, that such a function has to be pairwise independently and uniformly distributed. I would like to ...
0 votes
0 answers
165 views
Do "superfast" keyed hash functions exist?
A common family of requirements for (cryptographic) keyed hash functions is that the function $h(k,-)$ should have good collision resistance for all keys $k$, even if the key $k$ is known to the ...
5 votes
1 answer
208 views
The rigorous proof in the commitment based on CRHF
I'm reading about the lecture of Yevgeniy Dodis. In his lecture 14, section 2.3.2, gives a commitment construction based on CRHF, but the proof of hiding is high-level. I want to know the rigorous ...
3 votes
1 answer
303 views
UOWHF vs CRHF / Relevance of UOWHF
What's the difference between UOWHF and CRHF and why are UOWHF useful? As far as I understand, Universal One-Way Hash Functions are an alternative to CRHF. While for CRHF it is hard, given randomly ...
2 votes
1 answer
357 views
Create a control hash string from different sources, is there a difference, advantage or disadvantage in comparison when using this ways?
I wanna create from several inputs/sources should be formed into one hash value for controlling of different thinks later. Example: String + File String + String File + File String + File + String ...
2 votes
2 answers
357 views
Why do we need the leftover hash lemma for this hybrid proof (Learning with Errors)?
I've been reading about Learning with Errors here. On p. 7 there's a proof for the security of the PKE scheme, that goes through the leftover hash lemma, in order to prove that: $$ (pk, Enc(0))\equiv (...
1 vote
0 answers
105 views
Is the following statistically close to uniform? (and how does one prove such claims in general)
For every $a \in \{0,1\}^n$ define: $$h_a : \{0,1\}^n\to \{0,1\}$$ $$ h_a(b)=\langle a,b \rangle$$ So $\{h_a\}_{a \in \{0,1\}^n}$ is known to be a universal hash function family. This means that if we ...