[Resource Topic] 1998/011: The Random Oracle Methodology, Revisited

Welcome to the resource topic for 1998/011

Title:
The Random Oracle Methodology, Revisited

Authors: Ran Canetti, Oded Goldreich, Shai Halevi

Abstract:

We take a critical look at the relationship between the security of
cryptographic schemes in the Random Oracle Model, and the security of the
schemes that result from implementing the random oracle by so called
“cryptographic hash functions”.

The main result of this paper is a negative one: There exist signature and
encryption schemes that are secure in the Random Oracle Model, but for which
any implementation of the random oracle results in insecure schemes.

In the process of devising the above schemes, we consider possible definitions
for the notion of a “good implementation” of a random oracle, pointing out
limitations and challenges.

ePrint: https://eprint.iacr.org/1998/011

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .