Parametric hash function resistant to attack by quantum computer

Sergey Krendelev, Polina Sazonova

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2 Citations (Scopus)

Abstract

This paper describes an algorithm for creating hash function, resistant for quantum computer. The given approach is based on the problem of solving a system of polynomial equations in integers, where the number of equations is less than the number of unknown parameters. The developed algorithm is parameterized so the result of the hash function depends on several parameters, therefore, it will take considerably longer to select the solution of the task. The avalanche effect is about 50%, collision is impossible because the task to find a solution of the described system of equations with a degree greater than 3 is algorithmically unsolvable. This hash function was developed for blockchain to ensure its integrity, but it can also be used in any application where a hash function is needed.

Original languageEnglish
Title of host publicationProceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018
EditorsM Ganzha, L Maciaszek, M Paprzycki
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages387-390
Number of pages4
ISBN (Electronic)9788394941970
DOIs
Publication statusPublished - 26 Oct 2018
Event2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018 - Poznan, Poland
Duration: 9 Sep 201812 Sep 2018

Publication series

NameFederated Conference on Computer Science and Information Systems
PublisherIEEE
ISSN (Print)2325-0348

Conference

Conference2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018
CountryPoland
CityPoznan
Period09.09.201812.09.2018

OECD FOS+WOS

  • 1.02.ET COMPUTER SCIENCE, INFORMATION SYSTEMS
  • 1.02.EX COMPUTER SCIENCE, THEORY & METHODS
  • 1.01 MATHEMATICS

Fingerprint

Dive into the research topics of 'Parametric hash function resistant to attack by quantum computer'. Together they form a unique fingerprint.

Cite this