The random oracle methodology, revisited

Type: Article

Publication Date: 2004-07-01

Citations: 935

DOI: https://doi.org/10.1145/1008731.1008734

Abstract

We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called "cryptographic hash functions".The main result of this article is a negative one: There exist signature and encryption schemes that are secure in the Random Oracle Model, but for which any implementation of the random oracle results in insecure schemes. In the process of devising the above schemes, we consider possible definitions for the notion of a "good implementation" of a random oracle, pointing out limitations and challenges.

Locations

  • Journal of the ACM - View
  • arXiv (Cornell University) - View - PDF

Similar Works

Action Title Year Authors
+ The Random Oracle Methodology, Revisited 2000 Ran Canetti
Oded Goldreich
Shai Halevi
+ A rational approach to cryptographic protocols 2007 Pino Caballero‐Gil
C. Henández-Goya
Carlos Bruno-Castañeda
+ PDF Chat Threshold ring signature without random oracles 2011 Tsz Hon Yuen
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
+ Gost R 34.12-2015 (Kuznechik) analysis of a cryptographic algorithm 2023 Anvar Kabulov
Mansur Berdimurodov
+ New Notions of Security for Public-Key Cryptosystems with Adversarial Random Oracles (Survey) 2004 Mototsugu Nishioka
+ Mathematical foundations of modern cryptography: computational complexity perspective 2002 Shafi Goldwasser
+ Weakened Random Oracle Models with Target Prefix 2021 Masayuki Tezuka
Yusuke Yoshida
Keisuke Tanaka
+ PDF Chat Threshold trapdoor functions and their applications 2019 Binbin Tu
Yu Chen
Xueli Wang
+ Multi-sources Randomness Extraction over Finite Fields and Elliptic Curve 2015 Hortense Boudjou Tchapgnouo
Abdoul Aziz Ciss
+ Short signature without random oracles and the SDH assumption in bilinear groups 2008 Dan Boneh
Xavier Boyen
+ PDF Chat Correcting Subverted Random Oracles 2024 Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
Jiadong Zhu
+ Security of Blind Signatures Revisited 2016 Dominique Schröder
Dominique Unruh
+ A New cryptanalysis model based on random and quantum walks 2023 Ahmed Drissi
+ PDF Chat A new cryptanalysis model based on random and quantum walks 2023 Ahmed Drissi
+ PDF Chat A New Cryptanalysis Model Based on Random and Quantum Walks 2023 Ahmed Drissi
+ Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology 2019 Kazuma Ohara
Keita Emura
Goichiro Hanaoka
Ai Ishida
Kazuo Ohta
Yusuke Sakai
+ Formal Proofs for the Security of Signcryption 2002 Joonsang Baek
Ron Steinfeld
Yuliang Zheng
+ PDF Chat Comparison of security arguments of promising key encapsulation mechanisms 2022 Yu.I. Gorbenko
Serhii Kandii
+ Cryptology 2020 Arkadii Slinko
+ Signatures et notions de sécurité 2024 Marc Fischlin