Oracle Indistinguishability and its Applications
نویسندگان
چکیده
There are many ‘cascade-type’ constructions in symmetric key cryptography. For these, the output of a PRF (or block cipher) is cascaded to next PRF, and this continues until all blocks given message exhausted. In order prove security these constructions, traditionally multi-oracle families, together with query-based hybrid arguments used, but produce longer proofs which cannot be extended quantum security. paper, we point that oracle indistinguishability, first formalized by Zhandry later Song Yun, useful tool for proving cascade-type both classically quantumly. To illustrate this, using give classical proof NMAC. Also, RC (Randomized Cascade) construction, gives out weak secure,
منابع مشابه
Computation-Trace Indistinguishability Obfuscation and its Applications
We introduce a new, instance-based notion of indistinguishability obfuscation, called computation-trace indistinguishability obfuscation (CiO), for (parallel) RAM computation. CiO only obfuscates a fixed, single computation instance, as opposed to iO which obfuscates a function on all input instances. Specifically, for Π defined by (P, x) consisting of a (parallel) RAM program P and an input x,...
متن کاملRandom-Oracle Uninstantiability from Indistinguishability Obfuscation
Assuming the existence of indistinguishability obfuscation (iO), we show that a number of prominent transformations in the random-oracle model are uninstantiable in the standard model. We start by showing that the Encrypt-with-Hash transform of Bellare, Boldyreva and O’Neill (CRYPTO 2007) for converting randomized public-key encryption schemes to deterministic ones is not instantiable in the st...
متن کاملConcurrent Non-Malleable Witness Indistinguishability and its Applications
One of the central questions in Cryptography today is proving security of the protocols “on the Internet”, i.e., in a concurrent setting where there are multiple interactions between players, and where the adversary can play so called “man-in-the-middle” attacks, forwarding and modifying messages between two or more unsuspecting players. Indeed, the main challenge in this setting is to provide ...
متن کاملFormal Indistinguishability Extended to the Random Oracle Model
Several generic constructions for transforming one-way functions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of their arguments. That is, given the image by a one-way function of a random value, an adversary has only negligible probability to compute this random value. Encryption schemes must guarantee a stronger secrecy notion. They mu...
متن کاملReplacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
Our main result gives a way to instantiate the random oracle with a concrete hash function in “full domain hash” applications. The term full domain hash was first proposed by Bellare and Rogaway [BR93, BR96] and referred to a signature scheme from any trapdoor permutation that was part of their seminal work introducing the random oracle heuristic. Over time the term full domain hash has (inform...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3303575