Presentation 2009-07-03
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke NAITO, Lei WANG, Kazuo OHTA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In this paper, we discuss how to construct secure cryptosystems and secure hash functions in weakened random oracle models. The weakened random oracle model (WROM), which was introduced by Numayama et al. at PKC 2008, reflects recent attacks on hash functions. Though the security of cryptosystems in the random oracle model, ROM, has been discussed sufficiently, the same is not true for WROM. A few cryptosystems have been proven secure in WROM. In this paper, we will propose a new conversion that can convert any cryptosystem secure in ROM to a new cryptosystem that is secure in the first preimage tractable random oracle model FPT-ROM without re-proof. FPT-ROM is ROM without preimage resistance and so is the weakest of the WROM models. Since there are many secure cryptosystems in ROM, our conversion can yield many cryptosystems secure in FPT-ROM. The fixed input length weakened random oracle model, FIL-WROM, introduced by Liskov at SAC 2006, reflects the known weakness of compression functions. We will propose new hash functions that are indifferentiable from RO when the underlying compression function is modeled by a two-way partially-specified preimage-tractable fixed input length random oracle model (TFILROM). TFILROM is FIL-ROM without two types of preimage resistance and is the weakest of the FIL-WROM models. The proposed hash functions are more efficient than the existing hash functions which are indifferentiable from RO when the underlying compression function is modeled by TFILROM.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Cryptosystem / Hash Function / Weakened Random Oracle / Indifferentiability
Paper # ISEC2009-26,SITE2009-18,ICSS2009-40
Date of Issue

Conference Information
Committee SITE
Conference Date 2009/6/25(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Sub Title (in English)
Keyword(1) Cryptosystem
Keyword(2) Hash Function
Keyword(3) Weakened Random Oracle
Keyword(4) Indifferentiability
1st Author's Name Yusuke NAITO
1st Author's Affiliation Mitsubishi Electric Corporation()
2nd Author's Name Lei WANG
2nd Author's Affiliation The University of Electro-Communications
3rd Author's Name Kazuo OHTA
3rd Author's Affiliation The University of Electro-Communications
Date 2009-07-03
Paper # ISEC2009-26,SITE2009-18,ICSS2009-40
Volume (vol) vol.109
Number (no) 114
Page pp.pp.-
#Pages 8
Date of Issue