Abstract | ||
---|---|---|
We formalize the notion of several weakened random oracle models in order to capture which property of a hash function is crucial to prove the security of a cryptographic scheme. In particular, we focus on augmenting the random oracle with additional oracles that respectively return collisions, secondpreimages, and first-preimages. We study the security of the full domain hash signature scheme, as well as three variants thereof in the weakened random oracle models, leading to a separation result. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-540-78440-1_16 | Public Key Cryptography |
Keywords | Field | DocType |
additional oracle,hash function,weakened random oracle model,digital signature scheme,cryptographic scheme,random oracle,separation result,full domain hash signature,collision,digital signature,random oracle model,preimage | Pseudorandom function family,Merkle signature scheme,Computer science,Random oracle,Theoretical computer science,Digital signature,Hash function,Full Domain Hash,Random function,Schnorr signature | Conference |
Volume | ISSN | ISBN |
4939 | 0302-9743 | 3-540-78439-X |
Citations | PageRank | References |
13 | 0.55 | 18 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Akira Numayama | 1 | 17 | 1.61 |
Toshiyuki Isshiki | 2 | 69 | 5.02 |
Keisuke Tanaka | 3 | 278 | 19.04 |