How Risky Is the Random-Oracle Model?
From MaRDI portal
Publication:3183579
DOI10.1007/978-3-642-03356-8_26zbMath1252.94082OpenAlexW2148959297MaRDI QIDQ3183579
Gaëtan Leurent, Phong Q. Nguyen
Publication date: 20 October 2009
Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_26
Related Items (12)
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model ⋮ Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message ⋮ Public key encryption with equality test in the standard model ⋮ Short signatures from Diffie-Hellman: realizing almost compact public key ⋮ PKP-based signature scheme ⋮ Bonsai trees, or how to delegate a lattice basis ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Public key encryption with equality test from generic assumptions in the random oracle model ⋮ Hash Functions from Defective Ideal Ciphers ⋮ A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation ⋮ Public key encryption with equality test via hash proof system ⋮ Cryptography and algorithmic randomness
This page was built for publication: How Risky Is the Random-Oracle Model?