15.07.2013 Views

slides - Stanford Crypto Group

slides - Stanford Crypto Group

slides - Stanford Crypto Group

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The core problem: Lack of a definition<br />

Step 1: Prove security of scheme in the ROM.<br />

Step 2: Instantiate HASH via a cryptographic<br />

hash function H in an implementation.<br />

The instantiated scheme is then secure as long<br />

as H behaves “like a random oracle.”<br />

The ROM proof does not apply<br />

<strong>Crypto</strong>graphers don’t mind to the strong instantiated assumptions. scheme But<br />

they like to know exactly what they are assuming.<br />

It is not clear what this means.<br />

We lack a formal DEFINITION of what it<br />

means for a hash function to behave “like a<br />

random oracle.”<br />

1/9/13 Bellare, <strong>Stanford</strong> RWC Workshop<br />

12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!