Prof. Emo Welzl and Prof. Bernd Gärtner
|Mittagsseminar Talk Information|
Date and Time: Tuesday, January 25, 2011, 12:15 pm
Duration: This information is not available in the database
Location: OAT S15/S16/S17
Speaker: Robin Künzler
The two models mentioned in the title are widely used to prove the security of cryptographic schemes under the assumption that an ideal primitive (a random oracle, or an ideal cipher, respectively) is given.
It is natural to ask if security in one model also implies security in the other model, i.e., are the models equivalent? Coron et al. proved the second and more challenging direction of this equivalence in 2008. In my Master‘s Thesis I showed that their proof is not correct and together with Holenstein and Tessaro we recently gave a new proof . I am going to describe the two models, and then explain the security notion required to argue about their equivalence. Finally, I will describe the construction we use and sketch some of the challenges of the security proof.
 Thomas Holenstein, Robin Künzler, Stefano Tessaro: The Equivalence of the Random Oracle Model and the Ideal Cipher Model, Revisited. http://arxiv.org/abs/1011.1264v1
Automatic MiSe System Software Version 1.4803M | admin login