Random Oracles are Practical: A Paradigm for Designing Efficient Protocols

Random Oracles are Practical: A Paradigm for Designing Efficient Protocols

1993-11-03 | MIHIR BELLARE, PHILLIP ROGAWAY
The paper "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols" argues that the random oracle model, where all parties have access to a public random oracle, bridges cryptographic theory and practice. The authors propose a paradigm where a practical protocol is designed by first creating and proving a protocol in the random oracle model, then replacing the oracle with a function like a hash. This approach yields more efficient protocols while retaining the benefits of provable security. The paper illustrates this for encryption, signatures, and zero-knowledge proofs. The random oracle model is based on the idea that practical primitives, such as hash functions, can be used to simulate random oracles. The authors show that this model allows for efficient and secure protocols, even though the actual hash function is not a true random function. They emphasize that the security proofs are within the random oracle model, and the replacement of the oracle with a hash function is heuristic. The paper discusses various cryptographic problems and provides efficient solutions using the random oracle paradigm. It also justifies known heuristics and presents theoretical results in the random oracle model. The authors suggest constructions of hash functions that are appropriate for instantiating the random oracle. The paper also addresses the challenge of instantiating the random oracle with concrete hash functions. It highlights that standard hash functions like MD5 and SHA are not sufficient, but modified versions can be used. The authors provide examples of such instantiations, including truncated outputs, restricted input lengths, and non-standard uses of hash functions. The paper concludes that the random oracle model provides a practical and efficient way to design secure protocols, even though the actual security of the protocols depends on the properties of the hash function used. The authors argue that this model offers significant assurance benefits and is a valuable tool for cryptographic design.The paper "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols" argues that the random oracle model, where all parties have access to a public random oracle, bridges cryptographic theory and practice. The authors propose a paradigm where a practical protocol is designed by first creating and proving a protocol in the random oracle model, then replacing the oracle with a function like a hash. This approach yields more efficient protocols while retaining the benefits of provable security. The paper illustrates this for encryption, signatures, and zero-knowledge proofs. The random oracle model is based on the idea that practical primitives, such as hash functions, can be used to simulate random oracles. The authors show that this model allows for efficient and secure protocols, even though the actual hash function is not a true random function. They emphasize that the security proofs are within the random oracle model, and the replacement of the oracle with a hash function is heuristic. The paper discusses various cryptographic problems and provides efficient solutions using the random oracle paradigm. It also justifies known heuristics and presents theoretical results in the random oracle model. The authors suggest constructions of hash functions that are appropriate for instantiating the random oracle. The paper also addresses the challenge of instantiating the random oracle with concrete hash functions. It highlights that standard hash functions like MD5 and SHA are not sufficient, but modified versions can be used. The authors provide examples of such instantiations, including truncated outputs, restricted input lengths, and non-standard uses of hash functions. The paper concludes that the random oracle model provides a practical and efficient way to design secure protocols, even though the actual security of the protocols depends on the properties of the hash function used. The authors argue that this model offers significant assurance benefits and is a valuable tool for cryptographic design.
Reach us at info@study.space
[slides and audio] Random oracles are practical%3A a paradigm for designing efficient protocols