You are looking at a specific version 20130801:043135 of this paper. See the latest version.

Paper 2013/424

Instantiating Random Oracles via UCEs

Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi

Abstract

This paper provides a (standard-model) notion of security for (keyed) hash functions, called UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and systematic way. Goals and schemes we consider include deterministic PKE; message-locked encryption; hardcore functions; point-function obfuscation; OAEP; encryption secure for key-dependent messages; encryption secure under related-key attack; proofs of storage; and adaptively-secure garbled circuits with short tokens. We can take existing, natural and efficient ROM schemes and show that the instantiated scheme resulting from replacing the RO with a UCE function is secure in the standard model. In several cases this results in the first standard-model schemes for these goals. The definition of UCE-security itself is quite simple, asking that outputs of the function look random given some 'leakage', even if the adversary knows the key, as long as the leakage does not permit the adversary to compute the inputs.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. A preliminary version of this paper appears in the proceedings of CRYPTO 2013. This is the full version.
Keywords
Random oraclesdeterministic encryptionhardcore predicatesmessage-locked encryptionobfuscationgarbled circuitsrelated-key attackkey-dependent messagesproofs of storageOAEP
Contact author(s)
tvhoang @ ucdavis edu
History
2015-11-13: last of 8 revisions
2013-07-02: received
See all versions
Short URL
https://ia.cr/2013/424
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.