Global Information Lookup Global Information

Random oracle information


In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every unique query with a (truly) random response chosen uniformly from its output domain. If a query is repeated, it responds the same way every time that query is submitted.

Stated differently, a random oracle is a mathematical function chosen uniformly at random, that is, a function mapping each possible query to a (fixed) random response from its output domain.

Random oracles first appeared in the context of complexity theory, in which they were used to argue that complexity class separations may face relativization barriers, with the most prominent case being the P vs NP problem, two classes shown in 1981 to be distinct relative to a random oracle almost surely.[1] They made their way into cryptography by the publication of Mihir Bellare and Phillip Rogaway in 1993, which introduced them as a formal cryptographic model to be used in reduction proofs.[2]

They are typically used when the proof cannot be carried out using weaker assumptions on the cryptographic hash function. A system that is proven secure when every hash function is replaced by a random oracle is described as being secure in the random oracle model, as opposed to secure in the standard model of cryptography.

  1. ^ Bennett, Charles; Gill, John (1981). "Relative to a Random Oracle A, N^A != NP^A != coNP^A with Probability 1". SIAM Journal on Computing: 96–113. doi:10.1137/0210008.
  2. ^ Bellare, Mihir; Rogaway, Phillip (1993). "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols". ACM Conference on Computer and Communications Security: 62–73. doi:10.1145/168588.168596. S2CID 3047274.

and 21 Related for: Random oracle information

Request time (Page generated in 0.7959 seconds.)

Random oracle

Last Update:

In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every unique query with a (truly) random response chosen uniformly...

Word Count : 1775

Oracle machine

Last Update:

an oracle machine is an abstract machine used to study decision problems. It can be visualized as a Turing machine with a black box, called an oracle, which...

Word Count : 2014

Pseudorandom function family

Last Update:

emulate a random oracle in the following way: no efficient algorithm can distinguish (with significant advantage) between a function chosen randomly from the...

Word Count : 1023

BLS digital signature

Last Update:

existentially unforgeable under adaptive chosen-message attacks) in the random oracle model assuming the intractability of the computational Diffie–Hellman...

Word Count : 1009

Schnorr signature

Last Update:

modeled as a random oracle. Its security can also be argued in the generic group model, under the assumption that H {\displaystyle H} is "random-prefix preimage...

Word Count : 1237

Optimal asymmetric encryption padding

Last Update:

The OAEP algorithm is a form of Feistel network which uses a pair of random oracles G and H to process the plaintext prior to asymmetric encryption. When...

Word Count : 1451

Commitment scheme

Last Update:

construct in the random oracle model. Given a hash function H with a 3k bit output, to commit the k-bit message m, Alice generates a random k bit string R...

Word Count : 7699

Oblivious pseudorandom function

Last Update:

compute a PRF using a symmetric key construction, such as AES or HMAC. Random oracle Pseudorandom function family Oblivious transfer Secure multi-party computation...

Word Count : 3333

Mihir Bellare

Last Update:

development of random oracle model, modes of operation, HMAC, and models for key exchange. Bellare's papers cover topics including: HMAC Random oracle OAEP Probabilistic...

Word Count : 341

Probabilistic encryption

Last Update:

algorithms include Elgamal, Paillier, and various constructions under the random oracle model, including OAEP. Probabilistic encryption is particularly important...

Word Count : 583

Distinguishing attack

Last Update:

ciphertext is not random. To prove that a cryptographic function is safe, it is often compared to a random oracle. If a function were a random oracle, then an...

Word Count : 623

Deterministic encryption

Last Update:

the random oracle model. Two follow-up works appeared the next year in CRYPTO 2008, giving definitional equivalences and constructions without random oracles...

Word Count : 853

Chaos machine

Last Update:

base of chaos theory (mainly deterministic chaos) to produce pseudo-random oracle. It represents the idea of creating a universal scheme with modular...

Word Count : 234

PRF advantage

Last Update:

the algorithm can distinguish between a member of the family and a random oracle. Consequently, the maximum pseudorandom advantage attainable by any...

Word Count : 228

Full Domain Hash

Last Update:

existentially unforgeable under adaptive chosen-message attacks) in the random oracle model. FDH involves hashing a message using a function whose image size...

Word Count : 298

Cryptographic hash function

Last Update:

hash function should behave as much as possible like a random function (often called a random oracle in proofs of security) while still being deterministic...

Word Count : 6067

Pythia

Last Update:

Temple of Apollo at Delphi. She specifically served as its oracle and was known as the Oracle of Delphi. Her title was also historically glossed in English...

Word Count : 8153

ElGamal encryption

Last Update:

assuming DDH holds for G {\displaystyle G} . Its proof does not use the random oracle model. Another proposed scheme is DHIES, whose proof requires an assumption...

Word Count : 1477

Forking lemma

Last Update:

the same adversary with the same random tape can create a second forgery in an attack with a different random oracle. The forking lemma was later generalized...

Word Count : 1188

EdDSA

Last Update:

{q}}} . The hash function H {\displaystyle H} is normally modelled as a random oracle in formal analyses of EdDSA's security. Within an EdDSA signature scheme...

Word Count : 2081

List of cryptographers

Last Update:

Braid Group Cryptography. Mihir Bellare, US, UCSD, co-proposer of the Random oracle model. Dan Boneh, US, Stanford. Gilles Brassard, Canada, Université...

Word Count : 2349

PDF Search Engine © AllGlobal.net