Research on the Security Criteria of Hash Functions in the Blockchain

作者: Maoning Wang , Meijiao Duan , Jianming Zhu

DOI: 10.1145/3205230.3205238

关键词:

摘要: The blockchain is an emerging technology. Because of its efficiency and functionality, it widely considered to have revolutionary application prospects. As a supporting part the data structure, hash function important for ensuring availability security blockchain. To evaluate technology analyze several criteria functions used in This paper focuses on two criteria-hiding puzzle-friendliness-that should satisfy proposed by Narayanan et al. (Narayanan A, Bonneau J, Felten E, Bitcoin Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, 2016). Under framework Rogaway?Shrimpton's theory, their definitions are mathematically described relation proved. Also, comparisons between traditional ones made. conclusions this point out that functions, harder break hiding puzzle-friendliness than preimage resistance, which shows proven be preimage-resistant or tested cryptanalysis like SHA256 tend enough corresponding parts design. At same time, from attackers' view can provide theoretical basis studying potential attacks defects may exist structure applied

参考文章(28)
Stefan Lucks, Jon Callas, The Skein Hash Function Family ,(2009)
Elena Andreeva, Bart Mennink, Provable Chosen-Target-Forced-Midfix Preimage Resistance Selected Areas in Cryptography. pp. 37- 54 ,(2012) , 10.1007/978-3-642-28496-0_3
Matthias Tarasiewicz, Andrew Newman, Cryptocurrencies as Distributed Community Experiments Handbook of Digital Currency#R##N#Bitcoin, Innovation, Financial Instruments, and Big Data. pp. 201- 222 ,(2015) , 10.1016/B978-0-12-802117-0.00010-2
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer, New Second-Preimage Attacks on Hash Functions Journal of Cryptology. ,vol. 29, pp. 657- 696 ,(2016) , 10.1007/S00145-015-9206-4
John Kelsey, Tadayoshi Kohno, Herding Hash Functions and the Nostradamus Attack Advances in Cryptology - EUROCRYPT 2006. pp. 183- 200 ,(2006) , 10.1007/11761679_12
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, John Kelsey, Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård Selected Areas in Cryptography. ,vol. 5867, pp. 393- 414 ,(2009) , 10.1007/978-3-642-05445-7_25
Michal Rjaško, On chosen target forced prefix preimage resistance Tatra mountains mathematical publications. ,vol. 47, pp. 115- 135 ,(2010) , 10.2478/V10127-010-0034-5
Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz, Permacoin: Repurposing Bitcoin Work for Data Preservation ieee symposium on security and privacy. pp. 475- 490 ,(2014) , 10.1109/SP.2014.37
D. R. Stinson, Some Observations on the Theory of Cryptographic Hash Functions Designs, Codes and Cryptography. ,vol. 38, pp. 259- 277 ,(2006) , 10.1007/S10623-005-6344-Y