TY - JOUR
T1 - Indifferentiable deterministic hashing to elliptic and hyperelliptic curves
AU - Farashahi, Reza R.
AU - Fouque, Pierre Alain
AU - Shparlinski, Igor E.
AU - Tibouchi, Mehdi
AU - Voloch, J. Felipe
PY - 2013
Y1 - 2013
N2 - At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary elliptic curves that was indifferentiable from a random oracle, based on Icart's deterministic encoding from Crypto 2009. Such a hash function can be plugged into essentially any cryptosystem that requires hashing into elliptic curves, while not compromising proofs of security in the random oracle model. However, the proof relied on relatively involved tools from algebraic geometry, and only applied to Icart's deterministic encoding from Crypto 2009. In this paper, we present a new, simpler technique based on bounds of character sums to prove the indifferentiability of similar hash function constructions based on any of the known deterministic encodings to elliptic curves or curves of higher genus, such as the algorithms by Shallue, van de Woestijne and Ulas, or the Icart-like encodings recently presented by Kammerer, Lercier and Renault. In particular, we get the first constructions of well-behaved hash functions to Jacobians of hyperelliptic curves. Our technique also provides more precise estimates on the statistical behavior of those deterministic encodings and the hash function constructions based on them. Additionally, we can derive pseudorandomness results for partial bit patterns of such encodings.
AB - At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary elliptic curves that was indifferentiable from a random oracle, based on Icart's deterministic encoding from Crypto 2009. Such a hash function can be plugged into essentially any cryptosystem that requires hashing into elliptic curves, while not compromising proofs of security in the random oracle model. However, the proof relied on relatively involved tools from algebraic geometry, and only applied to Icart's deterministic encoding from Crypto 2009. In this paper, we present a new, simpler technique based on bounds of character sums to prove the indifferentiability of similar hash function constructions based on any of the known deterministic encodings to elliptic curves or curves of higher genus, such as the algorithms by Shallue, van de Woestijne and Ulas, or the Icart-like encodings recently presented by Kammerer, Lercier and Renault. In particular, we get the first constructions of well-behaved hash functions to Jacobians of hyperelliptic curves. Our technique also provides more precise estimates on the statistical behavior of those deterministic encodings and the hash function constructions based on them. Additionally, we can derive pseudorandomness results for partial bit patterns of such encodings.
UR - http://www.scopus.com/inward/record.url?scp=84872196960&partnerID=8YFLogxK
U2 - 10.1090/S0025-5718-2012-02606-8
DO - 10.1090/S0025-5718-2012-02606-8
M3 - Article
AN - SCOPUS:84872196960
SN - 0025-5718
VL - 82
SP - 491
EP - 512
JO - Mathematics of Computation
JF - Mathematics of Computation
IS - 281
ER -