Random oracle: Difference between revisions

Content deleted Content added
Tags: Mobile edit Mobile web edit
Citation bot (talk | contribs)
Altered pages. Formatted dashes. | Use this bot. Report bugs. | Suggested by Jay8g | Category:CS1 errors: empty unknown parameters‎ | #UCB_Category 2/2
Line 5:
Stated differently, a random oracle is a [[mathematical function]] chosen uniformly at random, that is, a function mapping each possible query to a (fixed) random response from its output ___domain.
 
Random oracles first appeared in the context of complexity theory, in which they were used to argue that complexity class separations may face relativization barriers, with the most prominent case being the [[P vs NP problem]], two classes shown in 1981 to be distinct relative to a random oracle [[almost surely]].<ref name="bennett-gill">{{cite journal|first1=Charles|last1=Bennett|author-link=Charles Bennett|first2=John|last2=Gill|author-link2=John Gill|title= Relative to a Random Oracle A, N^A != NP^A != coNP^A with Probability 1|journal=SIAM Journal on Computing|year=1981|pages=96-11396–113|doi=10.1137/0210008|doi-access=free}}</ref> They made their way into cryptography by the publication of [[Mihir Bellare]] and [[Phillip Rogaway]] in 1993, which introduced them as a formal cryptographic model to be used in reduction proofs.<ref name="bellrog">{{cite journal|first1=Mihir|last1=Bellare|author-link=Mihir Bellare|first2=Phillip|last2=Rogaway|author-link2=Phillip Rogaway|title=Random Oracles are Practical: A Paradigm for Designing Efficient Protocols|journal=ACM Conference on Computer and Communications Security|year=1993|pages=62–73|doi=10.1145/168588.168596 |s2cid=3047274 |doi-access=free}}</ref>
 
They are typically used when the proof cannot be carried out using weaker assumptions on the [[cryptographic hash function]]. A system that is proven secure when every hash function is replaced by a random oracle is described as being secure in the '''random oracle model''', as opposed to secure in the [[Standard model (cryptography)|standard model of cryptography]].
Line 65:
 
== Sources ==
* {{cite book | last1=Bellare | first1=Mihir | last2=Davis | first2=Hannah | last3=Günther | first3=Felix | series=Lecture Notes in Computer Science | volume=12106 | pages=3–32 | title=Advances in Cryptology – EUROCRYPT 2020 | |chapter="Separate"{ }Your|Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability | publisher=Springer International Publishing | publication-place=Cham | year=2020 | isbn=978-3-030-45723-5 | issn=0302-9743 | doi=10.1007/978-3-030-45724-2_1 | hdl=20.500.11850/392433 | s2cid=214642193 | chapter-url = https://hdl.handle.net/handle/20.500.11850/392433 }}
 
{{Cryptographic models}}