Spring 2017

Pseudorandomness Seminar

Apr 4, 2017 4:30 pm – 5:30 pm 

Add to Calendar

Parent Program: 

Calvin Lab Room 116

Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited

We revisit security proofs for various cryptographic primitives in the random oracle model with auxiliary input (ROM-AI): an attacker A can compute arbitrary S bits of leakage  about the random oracle O before attacking the system, and then use additional T oracle queries to O during the attack. This model was explicitly studied by Unruh  (CRYPTO 2007), but dates back to the seminal paper of Hellman in 1980 about time-space tradeoffs for inverting random functions, and has natural applications in settings where traditional random oracle proofs are not useful: (a) security against non-uniform attackers;  (b) security against preprocessing. We obtain a number of new results about ROM-AI but our main message is that ROM-AI is the “new cool kid in town”:  it nicely connects theory and practice, has a lot of exciting open questions and is still in its infancy.  In short, you should work on it! Based on joint works with Sandro Coretti, Yevgeniy Dodis and Jonathan Katz.