Paper 2009/550
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke Naito, Lei Wang, and Kazuo Ohta
Abstract
In this paper, we discuss how to construct secure cryptosystems and secure hash functions in weakened random oracle models.
~~~~The weakened random oracle model (
Metadata
- Available format(s)
-
PDF
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Random oracle modelhash functionsindifferentiability
- Contact author(s)
- tolucky tigers @ gmail com
- History
- 2009-11-16: received
- Short URL
- https://ia.cr/2009/550
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/550, author = {Yusuke Naito and Lei Wang and Kazuo Ohta}, title = {How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/550}, year = {2009}, url = {https://eprint.iacr.org/2009/550} }