Nothing Special   »   [go: up one dir, main page]

Skip to main content

Quantum cryptanalysis of hash and claw-free functions

Invited paper

  • Conference paper
  • First Online:
LATIN'98: Theoretical Informatics (LATIN 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1380))

Included in the following conference series:

Abstract

We give a quantum algorithm that finds collisions in arbitrary r-to-one functions after only O(3√N/r) expected evaluations of the function, where N is the cardinality of the domain. Assuming the function is given by a black box, this is more efficient than the best possible classical algorithm, even allowing probabilism. We also give a similar algorithm for finding claws in pairs of functions. Further, we exhibit a space-time tradeoff for our technique. Our approach uses Grover's quantum searching algorithm in a novel way.

Supported in part by Canada's nserc, Quebec's fcar, and the Canada Council.

Supported in part by the esprit Long Term Research Programme of the EU under project number 20244 (alcom-it). Research carried out while this author was at the Université de Montréal.

Supported in part by postgraduate fellowships from nserc and fcar

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Michel Boyer, Gilles Brassard, Peter HØyer and Alain Tapp, “Tight bounds on quantum searching”, Proceedings of Fourth Workshop on Physics and Computation — PhysComp '96, November 1996, pp. 36–43. Final version to appear in Fortschritte Der Physik.

    Google Scholar 

  2. Gilles Brassard, David Chaum and Claude Crépeau, “Minimum disclosure proofs of knowledge”, Journal of Computer and System Sciences, Vol. 37, no. 2, October 1988, pp. 156–189.

    Article  MathSciNet  Google Scholar 

  3. Gilles Brassard and Peter HØyer, “An exact quantum polynomial-time algorithm for Simon's problem”, Proceedings of Fifth Israeli Symposium on Theory of Computing and Systems — ISTCS '97, June 1997, IEEE Computer Society Press, pp. 12–23.

    Google Scholar 

  4. J. Larry Carter and Mark N. Wegman, “Universal classes of hash functions”, Journal of Computer and System Sciences, Vol. 18, no. 2, 1979, pp. 143–154.

    Article  MathSciNet  Google Scholar 

  5. Shafi Goldwasser, Silvio Micali and Ronald L. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks”, SIAM Journal on Computing, Vol. 17, 1988, pp. 281–308.

    Article  MathSciNet  Google Scholar 

  6. Lov K. Grover, “A fast quantum mechanical algorithm for database search”, Proceedings of the 28th Annual ACM Symposium on Theory of Computing, 1996, pp. 212–219.

    Google Scholar 

  7. Lov K. Grover, “Quantum mechanics helps in searching for a needle in a haystack”, Physical Review Letters, Vol. 79, no. 2, 14 July 1997, pp. 325–328.

    Article  Google Scholar 

  8. Eric Rains, talk given at AT&T, Murray Hill, New Jersey, 12 March 1997.

    Google Scholar 

  9. Daniel R. Simon, “On the power of quantum computation”, SI AM Journal on Computing, Vol. 26, no. 5, October 1997, pp. 1474–1483.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Cláudio L. Lucchesi Arnaldo V. Moura

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brassard, G., HØyer, P., Tapp, A. (1998). Quantum cryptanalysis of hash and claw-free functions. In: Lucchesi, C.L., Moura, A.V. (eds) LATIN'98: Theoretical Informatics. LATIN 1998. Lecture Notes in Computer Science, vol 1380. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054319

Download citation

  • DOI: https://doi.org/10.1007/BFb0054319

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64275-6

  • Online ISBN: 978-3-540-69715-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics