Cryptography and algorithmic randomness
K Tadaki, N Doi - Theory of Computing Systems, 2015 - Springer
K Tadaki, N Doi
Theory of Computing Systems, 2015•SpringerThe secure instantiation of the random oracle is one of the major open problems in modern
cryptography. We investigate this problem using concepts and methods of algorithmic
randomness. In modern cryptography, the random oracle model is widely used as an
imaginary framework in which the security of a cryptographic scheme is discussed. In the
random oracle model, the cryptographic hash function used in a cryptographic scheme is
formulated as a random variable uniformly distributed over all possibility of the function …
cryptography. We investigate this problem using concepts and methods of algorithmic
randomness. In modern cryptography, the random oracle model is widely used as an
imaginary framework in which the security of a cryptographic scheme is discussed. In the
random oracle model, the cryptographic hash function used in a cryptographic scheme is
formulated as a random variable uniformly distributed over all possibility of the function …
Abstract
The secure instantiation of the random oracle is one of the major open problems in modern cryptography. We investigate this problem using concepts and methods of algorithmic randomness. In modern cryptography, the random oracle model is widely used as an imaginary framework in which the security of a cryptographic scheme is discussed. In the random oracle model, the cryptographic hash function used in a cryptographic scheme is formulated as a random variable uniformly distributed over all possibility of the function, called the random oracle. The main result of this paper is to show that, for any secure signature scheme in the random oracle model, there exists a specific computable function which can instantiate the random oracle while keeping the security originally proved in the random oracle model. In modern cryptography the generic group model is used also for a similar purpose to the random oracle model. We show that the same results hold for the generic group model. In the process of proving the results, we introduce the notion of effective security, demonstrating the importance of this notion in modern cryptography.
Springer