It's also worth noting that EC based hashes were rejected as part of SHA3 (e.g. ECOH).
I guess because of the high consumption of computing resources (anyway, citation is needed, I agree).
ECOH was rejected due to a second preimage attack
Michael A. Halcrow, Niels Ferguson - A Second Pre-image Attack Against Elliptic Curve Only Hash ({ECOH})
I see. Thanks for the tip.
When SHA3 started, I was thinking around algorithm based on EC. But I finally I gave up. The problem with EC-hashing is the message splitting in blocks. If the message is one-block only, the EC is unfeasible. But if not, you must merge the different blocks some way. And EC has a "wonderful" property:
A=a·Q, B=b·Q; (A+B)=(a+b)·Q
So, it is not easy to merge the resulting EC-products in some non trivial way. Finally, the strength of the algorithm lies on the merging mechanism, not in EC itself.
As far as I read, this attack points to this fact.
My proposal targets an eventual inverse mapping (even if partial) weakness of SHA256, so EC is done almost at end, with only one block, result of previous hash. BTW, tt is possible to redefine h0 and h1 to discourage searching of collisions.