The Random Oracle Model: A Twenty-Year Retrospective

Provided by: University of Waterloo
Topic: Data Management
Format: PDF
It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one decade since the authors first discussed the controversy that had arisen concerning its use. In this paper, they argue that there is no evidence that the need for the random oracle assumption in a proof indicates the presence of a real-world security weakness in the corresponding protocol. They give several examples of attempts to avoid random oracles that have led to protocols that have security weaknesses that were not present in the original ones whose proofs required random oracles.

Find By Topic