On the cryptographic applications of random functions

  • Authors:
  • Oded Goldreich;Shafi Goldwasser;Silvio Micali

  • Affiliations:
  • -;-;-

  • Venue:
  • Proceedings of CRYPTO 84 on Advances in cryptology
  • Year:
  • 1985

Quantified Score

Hi-index 0.00

Visualization

Abstract

Now that "random functions" can be efficiently constructed ([GGM]), we discuss some of their possible applications to cryptography: 1) Distributing unforgable ID numbers which can be locally verified by stations which contain only a small amount of storage. 2) Dynamic Hashing: even if the adversary can change the key-distribution depending on the values the hashing function has assigned to the previous keys, still he can not force collisions. 3) Constructing deterministic, memoryless authentication schemes which are provably secure against chosen message attack. 4) Construction Identity Friend or Foe systems.