Statements (22)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cryptographic model
|
gptkbp:alternativeTo |
standard model
|
gptkbp:assumes |
hash function behaves as a random function
|
gptkbp:citation |
gptkb:Bellare_and_Rogaway,_'Random_Oracles_are_Practical:_A_Paradigm_for_Designing_Efficient_Protocols',_1993
|
gptkbp:criticizedFor |
cryptographers
not always reflecting real-world hash functions |
gptkbp:describes |
idealized hash function
|
https://www.w3.org/2000/01/rdf-schema#label |
Random Oracle Model
|
gptkbp:introduced |
gptkb:Mihir_Bellare
gptkb:Phillip_Rogaway |
gptkbp:introducedIn |
1993
|
gptkbp:limitation |
schemes secure in the model may be insecure in practice
|
gptkbp:relatedTo |
gptkb:Fiat-Shamir_heuristic
digital signatures hash function provable security encryption schemes |
gptkbp:usedFor |
proving security of cryptographic schemes
|
gptkbp:usedIn |
cryptography
cryptographic protocol design |
gptkbp:bfsParent |
gptkb:Mihir_Bellare
|
gptkbp:bfsLayer |
5
|