Random Oracles Are Practical: a P Aradigm for Designing Eecient Protocols

نویسندگان

  • Mihir Bellare
  • Phillip Rogaway
چکیده

We argue that the random oracle model |where all parties have access to a public random oracle| provides a bridge between cryptographic theory and cryptographic practice. In the paradigm we suggest, a practical protocol P is produced by rst devising and proving correct a protocol P for the random oracle model, and then replacing oracle accesses by the computation of an \appropriately chosen" function h. This paradigm yields protocols much more e cient than standard ones while retaining many of the advantages of provable security. We illustrate these gains for problems including encryption, signatures, and zero-knowledge proofs. Department of Computer Science & Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, La Jolla, CA 92093. E-mail: [email protected] y Department of Computer Science, University of California at Davis, Davis, CA 95616, USA. E-mail: [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information

The random oracle model is a very convenient setting for designing cryptographic protocols. In this idealized model all parties have access to a common, public random function, called a random oracle. Protocols in this model are often very simple and efficient; also the analysis is often clearer. However, we do not have a general mechanism for transforming protocols that are secure in the rando...

متن کامل

Eecient Speciication-based Oracles for Critical Systems

EEective testing of critical systems has been hampered by the lack of a cost-eeective method for deciding the correctness of a program's behavior under test. Using formal speciications to describe the critical system properties and then checking test results against these spe-ciications overcomes these problems. If these test oracles , which are mechanisms for determining whether a test passes ...

متن کامل

A Threshold Pseudorandom Function Construction and Its Applications

We give the first construction of a practical threshold pseudorandom function. The protocol for evaluating the function is efficient enough that it can be used to replace random oracles in some protocols relying on such oracles. In particular, we show how to transform the efficient cryptographically secure Byzantine agreement protocol by Cachin, Kursawe and Shoup for the random oracle model int...

متن کامل

Strongly secure authenticated key exchange in the standard model

Nowadays many crucial network applications rely on the existence of a confidential channel established by authenticated key exchange (AKE) protocols over public networks. With the rapid development of cyber technology, novel attacks to cryptosystem emerge in an endless stream. This has also led to the development of AKE solutions to provide increasingly stronger security guarantees. In this the...

متن کامل

The Wonderful World of Global Random Oracles

The random-oracle model by Bellare and Rogaway (CCS’93) is an indispensable tool for the security analysis of practical cryptographic protocols. However, the traditional random-oracle model fails to guarantee security when a protocol is composed with arbitrary protocols that use the same random oracle. Canetti, Jain, and Scafuro (CCS’14) put forth a global but non-programmable random oracle in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993