[148863] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[Cryptography] Strict memory hard hash functions

daemon@ATHENA.MIT.EDU (Sergio Lerner)
Tue Dec 31 15:43:26 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 31 Dec 2013 17:35:23 -0300
From: Sergio Lerner <sergiolerner@pentatek.com>
CC: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
In-Reply-To: <448D56B3-59F3-426A-94D5-FA3D4AC68322@sxpert.org>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

Hi!
I've been playing with a property I named Strict memory hard hash
functions.  Strict memory hard functions are an extension of memory hard
functions such that a slight reduction in the memory available for
computation, compared to a predefined optimal memory size, makes the
function evaluation exponentially slower or infeasible. The main
application of strict memory hard functions is to prove a certain amount
of memory is used during a certain time interval or in a certain
computation. This in turn can be used to attest that areas of memory of
devices do not contain hidden data. Other applications are password
hashing and proof of work. I wrote a preliminary paper of  SeqMemoHash
and TreeMemoHash, two strict sequential memory hard functions under the
random oracle model.

It can be downloaded here:
http://bitslog.files.wordpress.com/2013/12/memohash-v0-1.pdf

Please send me comments regarding the security/usefulness of these
constructions!

Best regards and happy new year,
 Sergio.




_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post