Presentation | 2009-07-03 How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models Yusuke NAITO, Lei WANG, Kazuo OHTA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In this paper, we discuss how to construct secure cryptosystems and secure hash functions in weakened random oracle models. The weakened random oracle model (WROM), which was introduced by Numayama et al. at PKC 2008, reflects recent attacks on hash functions. Though the security of cryptosystems in the random oracle model, ROM, has been discussed sufficiently, the same is not true for WROM. A few cryptosystems have been proven secure in WROM. In this paper, we will propose a new conversion that can convert any cryptosystem secure in ROM to a new cryptosystem that is secure in the first preimage tractable random oracle model FPT-ROM without re-proof. FPT-ROM is ROM without preimage resistance and so is the weakest of the WROM models. Since there are many secure cryptosystems in ROM, our conversion can yield many cryptosystems secure in FPT-ROM. The fixed input length weakened random oracle model, FIL-WROM, introduced by Liskov at SAC 2006, reflects the known weakness of compression functions. We will propose new hash functions that are indifferentiable from RO when the underlying compression function is modeled by a two-way partially-specified preimage-tractable fixed input length random oracle model (TFILROM). TFILROM is FIL-ROM without two types of preimage resistance and is the weakest of the FIL-WROM models. The proposed hash functions are more efficient than the existing hash functions which are indifferentiable from RO when the underlying compression function is modeled by TFILROM. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cryptosystem / Hash Function / Weakened Random Oracle / Indifferentiability |
Paper # | ISEC2009-26,SITE2009-18,ICSS2009-40 |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2009/6/25(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models |
Sub Title (in English) | |
Keyword(1) | Cryptosystem |
Keyword(2) | Hash Function |
Keyword(3) | Weakened Random Oracle |
Keyword(4) | Indifferentiability |
1st Author's Name | Yusuke NAITO |
1st Author's Affiliation | Mitsubishi Electric Corporation() |
2nd Author's Name | Lei WANG |
2nd Author's Affiliation | The University of Electro-Communications |
3rd Author's Name | Kazuo OHTA |
3rd Author's Affiliation | The University of Electro-Communications |
Date | 2009-07-03 |
Paper # | ISEC2009-26,SITE2009-18,ICSS2009-40 |
Volume (vol) | vol.109 |
Number (no) | 114 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |