Standard model (cryptography)

From HandWiki

In cryptography the standard model is the model of computation in which the adversary is only limited by the amount of time and computational power available. Other names used are bare model and plain model. Cryptographic schemes are usually based on complexity assumptions, which state that some problems, such as factorization, cannot be solved in polynomial time. Schemes that can be proven secure using only complexity assumptions are said to be secure in the standard model. Security proofs are notoriously difficult to achieve in the standard model, so in many proofs, cryptographic primitives are replaced by idealized versions. The most common example of this technique, known as the random oracle model,[1][2][3] where the adversary is given access to a randomly chosen encoding of a group, instead of the finite field or elliptic curve groups used in practice.

Other models used invoke trusted third parties to perform some task without cheating; for example, the public key infrastructure (PKI) model requires a certificate authority, which if it were dishonest, could produce fake certificates and use them to forge signatures, or mount a man in the middle attack to read encrypted messages. Other examples of this type are the common random string model, where it is assumed that all parties have access to some string chosen uniformly at random, and its generalization, the common reference string model, where a string is chosen according to some other probability distribution.[4] These models are often used for non-interactive zero-knowledge proofs (NIZK). In some applications, such as the Dolev–Dwork–Naor encryption scheme,<ref>{{ cite conference

| title = Non-Malleable Cryptography
| book-title = Symposium on Theory of Computing (STOC)
| pages = 542–552
| publisher = ACM
| date = 1991
| url = http://www.cs.huji.ac.il/~dolev/pubs/nmc.pdf
| access-date = 2011-12-18

References

  1. Mihir Bellare; Phillip Rogaway (1993). "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols". ACM. pp. 62–73. http://www.cs.ucsd.edu/users/mihir/papers/ro.html. Retrieved 2007-11-01. 
  2. Victor Shoup (1997). "Lower bounds for discrete logarithms and related problems". 1233. Springer-Verlag. pp. 256–266. http://www.shoup.net/papers/evalbound.pdf. Retrieved 2007-11-01. 
  3. Ueli Maurer (2005). "Abstract models of computation in cryptography". 3796. Springer-Verlag. pp. 1–12. ftp://ftp.inf.ethz.ch/pub/crypto/publications/Maurer05.pdf. Retrieved 2007-11-01. 
  4. Canetti, Ran; Pass, Rafael; Shelat, Abhi (2007). "Cryptography from Sunspots: How to Use an Imperfect Reference String". 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). pp. 249–259. doi:10.1109/focs.2007.70. ISBN 978-0769530109.