Statements (17)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cryptographic_model
|
| gptkbp:assumes |
hash function behaves as random function
|
| gptkbp:criticizedFor |
gptkb:cryptographers
|
| gptkbp:describes |
idealized hash function
|
| gptkbp:introduced |
gptkb:Mihir_Bellare
gptkb:Phillip_Rogaway |
| gptkbp:introducedIn |
1993
|
| gptkbp:limitation |
schemes secure in random oracle model may be insecure in practice
|
| gptkbp:publishedIn |
gptkb:Proceedings_of_the_1st_ACM_Conference_on_Computer_and_Communications_Security
|
| gptkbp:relatedTo |
gptkb:hash_function
gptkb:crypt provable security |
| gptkbp:usedFor |
security proofs
|
| gptkbp:usedIn |
cryptography
|
| gptkbp:bfsParent |
gptkb:Boneh–Lynn–Shacham_signature
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
Random oracle model
|