The random oracle methodology, revisited.
From MaRDI portal
Publication:3069902
DOI10.1145/1008731.1008734zbMATH Open1204.94063OpenAlexW2152688060MaRDI QIDQ3069902FDOQ3069902
Authors: Ran Canetti, Oded Goldreich, Shai Halevi
Publication date: 1 February 2011
Published in: Journal of the ACM (Search for Journal in Brave)
Full work available at URL: https://hdl.handle.net/2144/39024
Recommendations
Cited In (only showing first 100 items - show all)
- Efficient public key encryption with equality test in the standard model
- How to Generate and Use Universal Samplers
- Instantiation of quantum point obfuscation
- Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs
- Post-quantum anonymous one-sided authenticated key exchange without random oracles
- Second order collision for the 42-step reduced DHA-256 hash function
- Certificateless signature scheme with security enhanced in the standard model
- Public key encryption with equality test from generic assumptions in the random oracle model
- Toward non-interactive zero-knowledge proofs for NP from LWE
- A strong designated verifier proxy re-signature scheme for IoT environments
- Toward RSA-OAEP Without Random Oracles
- Multikey Fully Homomorphic Encryption and Applications
- Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
- Cryptography and algorithmic randomness
- The Complexity of Zero Knowledge
- Efficient identity-based signcryption in the standard model
- Non-interactive batch arguments for NP from standard assumptions
- How to Simulate It – A Tutorial on the Simulation Proof Technique
- Instantiability of classical random-oracle-model encryption transforms
- A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption
- An Efficient and Provably Secure Private Polynomial Evaluation Scheme
- Simulation-sound arguments for LWE and applications to KDM-CCA2 security
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
- Traceable ring signatures: general framework and post-quantum security
- One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model
- SNARGs for P from sub-exponential DDH and QR
- Certificateless two-party authenticated key agreement scheme for smart grid
- \textsc{Fractal}: post-quantum and transparent recursive proofs from holography
- Non-interactive zero knowledge from sub-exponential DDH
- On the compressed-oracle technique, and post-quantum security of proofs of sequential work
- Non-interactive composition of sigma-protocols via Share-then-Hash
- NIZK from LPN and trapdoor hash via correlation intractability for approximable relations
- Multi-theorem designated-verifier NIZK for QMA
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
- TARD: temporary access rights delegation for guest network devices
- Cryptographic pseudorandom generators can make cryptosystems problematic
- Abstractions of non-interference security: probabilistic versus possibilistic
- Secure identity-based signcryption in the standard model
- A lattice-based signcryption scheme without random oracles
- Practical chosen ciphertext secure encryption from factoring
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- Secure independent-update concise-expression access control for video on demand in cloud
- Naor-Yung paradigm with shared randomness and applications
- A theoretical framework for the analysis of physical unclonable function interfaces and its relation to the random oracle model
- Secure MPC: laziness leads to GOD
- Interactive Oracle Proofs
- Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
- How Risky Is the Random-Oracle Model?
- Notes on a provably-secure certificate-based encryption against malicious CA attacks
- Identity-based aggregate signcryption in the standard model from multilinear maps
- Indifferentiability for public key cryptosystems
- Practical Chosen Ciphertext Secure Encryption from Factoring
- Random oracles and non-uniformity
- Random oracles with(out) programmability
- Weak-key distinguishers for AES
- Salvaging Merkle-Damgård for Practical Applications
- Certificateless strong key-insulated signature without random oracles
- A practical protocol for three-party authenticated quantum key distribution
- Another step towards realizing random oracles: non-malleable point obfuscation
- Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model
- A random oracle for all of us
- Theory of Cryptography
- How to build an ideal cipher: the indifferentiability of the Feistel construction
- A pairing-based publicly verifiable secret sharing scheme
- Confidential and efficient asset proof for bitcoin exchanges
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
- Title not available (Why is that?)
- Impossibility of simulation secure functional encryption even with random oracles
- Theory of Cryptography
- Fast, compact, and expressive attribute-based encryption
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- On the implementation of huge random objects
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Merkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles
- A formal security analysis of the Signal messaging protocol
- Efficient Non-interactive Range Proof
- Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem
- Known-Key Distinguishers for Some Block Ciphers
- Round-optimal black-box protocol compilers
- Leaky Random Oracle (Extended Abstract)
- Exploring confusion in product ciphers through regression analysis
- A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
- Garbling XOR gates ``for free in the standard model
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model
- Identity-based partially blind signature in the standard model for electronic cash
- Efficient Traceable Signatures in the Standard Model
- The random oracle model: a twenty-year retrospective
- Strong key-insulated signature in the standard model
- On best-possible obfuscation
- Certificateless signcryption scheme in the standard model
- Cryptographic Assumptions: A Position Paper
- On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
- Adaptively secure non-interactive threshold cryptosystems
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
- Unprovable security of perfect NIZK and non-interactive non-malleable commitments
- Sound and complete computational interpretation of symbolic hashes in the standard model
- Instantiability of RSA-OAEP under chosen-plaintext attack
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack
- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This page was built for publication: The random oracle methodology, revisited.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3069902)