Presentation 2008-02-28
Random Oracle Model with Inspection of Hash List
Kazuki YONEYAMA, Satoshi MIYAGAWA, Kazuo OHTA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The dependency to random oracle is not same in all cryptographic schemes which are secure in the random oracle model (ROM) because all properties which a random oracle has (collision-resistance, hash value is truly random, etc) are not necessary for all cryptographic schemes. In this paper, we introduce a variant of the ROM where inspection of hash list is allowed. In this setting, the adversary can access the hash list of the random oracle at any time. Moreover, we consider the dependency of cryptographic schemes (OAEP, Fujisaki-Okamoto Transformation, FDH) utilizing this model.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) random oracle model / hash list / Provable Security / OAEP / FDH
Paper # IT2007-34,ISEC2007-131,WBS2007-65
Date of Issue

Conference Information
Committee ISEC
Conference Date 2008/2/21(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Random Oracle Model with Inspection of Hash List
Sub Title (in English)
Keyword(1) random oracle model
Keyword(2) hash list
Keyword(3) Provable Security
Keyword(4) OAEP
Keyword(5) FDH
1st Author's Name Kazuki YONEYAMA
1st Author's Affiliation The University of Electro-Communications()
2nd Author's Name Satoshi MIYAGAWA
2nd Author's Affiliation The University of Electro-Communications
3rd Author's Name Kazuo OHTA
3rd Author's Affiliation The University of Electro-Communications
Date 2008-02-28
Paper # IT2007-34,ISEC2007-131,WBS2007-65
Volume (vol) vol.107
Number (no) 500
Page pp.pp.-
#Pages 7
Date of Issue