{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:28:59Z","timestamp":1742945339321,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609567"},{"type":"electronic","value":"9789819609574"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0957-4_2","type":"book-chapter","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:07Z","timestamp":1738272847000},"page":"23-42","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ROM Reduction Failures: Reasons and\u00a0Solutions"],"prefix":"10.1007","author":[{"given":"Ziyi","family":"Li","sequence":"first","affiliation":[]},{"given":"Xianhui","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Ananth, P., Bhaskar, R.: Non observability in the random oracle model. In: ProvSec. LNCS, vol.\u00a08209, pp. 86\u2013103. Springer (2013)","DOI":"10.1007\/978-3-642-41227-1_5"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Boldyreva, A., O\u2019Neill, A.: Deterministic and efficiently searchable encryption. In: CRYPTO. LNCS, vol.\u00a04622, pp. 535\u2013552. Springer (2007)","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Davis, H., G\u00fcnther, F.: Separate your domains: NIST PQC kems, oracle cloning and read-only indifferentiability. In: EUROCRYPT (2). LNCS, vol. 12106, pp. 3\u201332. Springer (2020)","DOI":"10.1007\/978-3-030-45724-2_1"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS, pp. 62\u201373. ACM (1993)","DOI":"10.1145\/168588.168596"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: EUROCRYPT. LNCS, vol.\u00a0950, pp. 92\u2013111. Springer (1994)","DOI":"10.1007\/BFb0053428"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and rabin. In: EUROCRYPT. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer (1996)","DOI":"10.1007\/3-540-68339-9_34"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: EUROCRYPT. LNCS, vol.\u00a04004, pp. 409\u2013426. Springer (2006)","DOI":"10.1007\/11761679_25"},{"key":"2_CR8","unstructured":"Bernstein, D.J.: On the looseness of FO derandomization. IACR Cryptology ePrint Archive, p.\u00a0912 (2021). https:\/\/eprint.iacr.org\/2021\/912"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Dagdelen, \u00d6., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: ASIACRYPT. LNCS, vol.\u00a07073, pp. 41\u201369. Springer (2011)","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Feistel, H.: Cryptography and computer privacy. Sci. Am. 15\u201323 (1973)","DOI":"10.1038\/scientificamerican0573-15"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: CRYPTO. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer (1986)","DOI":"10.1007\/3-540-47721-7_12"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Fischlin, M., Lehmann, A., Ristenpart, T., Shrimpton, T., Stam, M., Tessaro, S.: Random oracles with(out) programmability. In: ASIACRYPT. LNCS, vol.\u00a06477, pp. 303\u2013320. Springer (2010)","DOI":"10.1007\/978-3-642-17373-8_18"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer (1999)","DOI":"10.1007\/3-540-48405-1_34"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Okamoto, T., Pointcheval, D., Stern, J.: RSA-OAEP is secure under the RSA assumption. In: CRYPTO. LNCS, vol.\u00a02139, pp. 260\u2013274. Springer (2001)","DOI":"10.1007\/3-540-44647-8_16"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Hofheinz, D., H\u00f6velmanns, K., Kiltz, E.: A modular analysis of the Fujisaki-Okamoto transformation. In: TCC (1). LNCS, vol. 10677, pp. 341\u2013371. Springer (2017)","DOI":"10.1007\/978-3-319-70500-2_12"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Reingold, O., Trevisan, L., Vadhan, S.P.: Notions of reducibility between cryptographic primitives. In: TCC. LNCS, vol.\u00a02951, pp. 1\u201320. Springer (2004)","DOI":"10.1007\/978-3-540-24638-1_1"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Zhandry, M.: Augmented random oracles. In: CRYPTO (3). LNCS, vol. 13509, pp. 35\u201365. Springer (2022)","DOI":"10.1007\/978-3-031-15982-4_2"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0957-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:11Z","timestamp":1738272851000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0957-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819609567","9789819609574"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0957-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2024.github.io\/ProvSec2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}