Corruption-localizing hashing

  • Authors:
  • Giovanni Di Crescenzo;Shaoquan Jiang;Reihaneh Safavi-Naini

  • Affiliations:
  • Telcordia Technologies, Piscataway, NJ;School of Computer Science, University of Electronic Science and Technology of China, China;Department of Computer Science, University of Calgary, Canada

  • Venue:
  • ESORICS'09 Proceedings of the 14th European conference on Research in computer security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Collision-intractable hashing is an important cryptographic primitive with numerous applications including efficient integrity checking for transmitted and stored data, and software. In several of these applications, it is important that in addition to detecting corruption of the data we also localize the corruptions. This motivates us to introduce and investigate the new notion of corruptionlocalizing hashing, defined as a natural extension of collision-intractable hashing. Our main contribution is in formally defining corruption-localizing hash schemes and designing two such schemes, one starting from any collision-intractable hash function, and the other starting from any collision-intractable keyed hash function. Both schemes have attractive efficiency properties in three important metrics: localization factor, tag length and localization running time, capturing the quality of localization, and performance in terms of storage and time complexity, respectively. The closest previous results, when modified to satisfy our formal definitions, only achieve similar properties in the case of a single corruption.