Sciweavers

PKC
2010
Springer

Security of Encryption Schemes in Weakened Random Oracle Models

14 years 4 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, which are expected to have the standard security of hash functions, i.e., collision resistance, second-preimage resistance, and one-wayness properties. The WROMs offer additional oracles to break such properties of the random oracle. In this paper, we investigate whether public-key encryption schemes in the random oracle model essentially require the standard security of hash functions by the WROMs. In particular, we deal with four WROMs associated with the standard security of hash functions; the standard, collision tractable, second-preimage tractable, first-preimage tractable ones (ROM, CT-ROM, SPT-ROM, and FPT-ROM, respectively), done by Numayama et al. for digital signature schemes in the WROMs. We obtain the following results: (1) The OAEP is secure in all the four models. (2) The encryption schemes obt...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K
Added 14 Aug 2010
Updated 14 Aug 2010
Type Conference
Year 2010
Where PKC
Authors Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa
Comments (0)