Notes for Lecture 23 1 Hybrid Encryption with a Random Oracle

نویسنده

  • Guoming Wang
چکیده

As we discussed in the previous lecture, a cryptographic scheme defined in the random oracle model is allowed to use a random function H : {0, 1} → {0, 1} which is known to all the parties. In an implementation, usually a cryptographic hash function replaces the random oracle. In general, the fact that a scheme is proved secure in the random oracle model does not imply that it is secure when the random oracle is replaced by a hash function; the proof of security in the random oracle model gives, however, at least some heuristic confidence in the soundness of the design.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications

Public key cryptography has been invented to overcome some key management problems in open networks. Although nearly all aspects of public key cryptography rely on the existence of trapdoor one-way functions, only a very few candidates of this primitive have been observed yet. In this paper, we introduce a new trapdoor one-way permutation based on the hardness of factoring integers of pq-type. ...

متن کامل

Survey of the EAX mode of operation

This report is a survey of the authenticated encryption mode EAX proposed M. Bellare, P. Rogaway, D. Wagner [1] ; Definitions, theorems and proofs has been slighty changed to make them more similar to the framework of the course. The definitions in Stinson [7] , and the definitions of oracle proofs in the lecture notes by Ivan Bjerre Damgaard[3][4]. This is done to meet the formal requirement o...

متن کامل

Quantum security of the Fujisaki-Okamoto transform

In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure in the quantum random oracle model. Our scheme is a combination of an asymmetric and a symmetric encryption scheme that are secure in a weak sense. It is a slight modi cation of Fujisaki and Okamoto's transformation that is secure against classical adversaries. keywords: Quantum, Random Oracle, Indistinguishab...

متن کامل

Identity Based Key Encapsulation with Wildcards

We propose a hybrid (KEM/DEM) model for the recently proposed primitive of identity-based encryption with wildcards (WIBE), and confirm that the hybrid construction is secure. We also propose new chosenciphertext secure WIBE schemes that have somewhat more efficient security reductions and some performance benefits. Our first construction is a generic one from any one-way secure WIBE in the ran...

متن کامل

Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms

In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure in the quantum random oracle model. Our scheme is a combination of an asymmetric and a symmetric encryption scheme that are secure in a weak sense. It is a slight modification of the Fujisaki-Okamoto transform that is secure against classical adversaries. In addition, we modify the OAEP-cryptosystem and prove ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009