CT-ROM: Collision-Tractable Random Oracle Model
- CT-ROM is a variant of the Random Oracle Model that explicitly allows an adversary to query a collision oracle, thereby breaking collision resistance while maintaining preimage properties.
- It is used to precisely analyze cryptographic schemes like RSA-FDH by modeling how collision vulnerabilities can be exploited in security reductions.
- CT-ROM is integral for isolating the role of collision resistance in cryptographic proofs, guiding the design and assessment of secure hash function instantiations.
The Collision–Tractable Random Oracle Model (CT–@@@@1@@@@) is a weakened variant of the standard Random Oracle Model (ROM) in cryptographic security proofs. CT-ROM modifies the classical idealization of a hash function by allowing an adversary not only to query a Random Oracle (RO) but also to query an additional oracle that enables the adversary to efficiently find hash collisions. This model is pivotal for precisely identifying the role that collision resistance plays in the security of cryptographic schemes and for capturing the impact of broken collision resistance in security reductions (Tezuka et al., 2021).
1. Formal Definition and Oracles
Let denote a family of hash functions, with and . In the CT-ROM, an adversary interacts with two idealized oracles:
- Random Oracle (): On query , if exists in the internal table , is returned. Otherwise, is sampled uniformly at random from , is stored in , and is returned.
- Collision Oracle (): On a query with no input, a uniform is selected. If there exists with , such an is selected uniformly at random and the collision is returned. If no such exists, it returns .
Table 1: Oracle Access in ROM Variants
| Model | Random Oracle () | Additional Oracle |
|---|---|---|
| ROM | Yes | None |
| CT-ROM | Yes | (Collision Oracle) |
| SPT-ROM | Yes | (Second-Preimage) |
| FPT-ROM | Yes | (First-Preimage) |
The CT-ROM explicitly breaks collision resistance by equipping the adversary with a collision-finding capability, while leaving second- and first-preimage resistance idealized (Tezuka et al., 2021).
2. Security Games and Definitions
The existential-unforgeability under chosen-message attack (EUF-CMA) game for a signature scheme in the CT-ROM is defined as follows:
- The challenger generates keys and gives to .
- may adaptively make:
- Signing queries on messages to receive .
- RO queries on to receive .
- CO queries to receive .
- outputs and wins if and was not submitted to the signing oracle.
The adversary's advantage in this game is
Collision-tractability is defined via the advantage
A hash family is –collision-tractable if a –time adversary using at most RO and CO queries achieves advantage at least , with non-negligible in (Tezuka et al., 2021).
3. Comparison with Related Weakened Random Oracle Models
Several weakened random oracle models (WROMs), as formalized by Numayama et al. and Tan and Wong, systematically capture the failure of specific hash function properties:
- Standard ROM: Only is present. Both collision and (first or second) preimage resistance are unbroken and idealized.
- CT-ROM: Adds . Collision resistance is no longer idealized, but preimage properties are.
- SPT-ROM: Replaces by , which returns with , breaking second-preimage resistance exclusively.
- FPT-ROM: Replaces by , returning such that , capturing broken (first) preimage resistance only.
These distinctions allow security proofs to be precisely mapped to the minimal hash function property necessary for a scheme’s security (Tezuka et al., 2021).
4. Insecurity of RSA-FDH in the CT-ROM
The RSA Full Domain Hash (RSA-FDH) signature scheme, when analyzed in CT-ROM, is shown to be insecure due to the adversary’s access to the collision oracle.
- RSA-FDH Scheme
- : Standard RSA key generation ; , .
- : ; .
- : Accept iff .
Using , the adversary:
- Obtains a collision with using a single CO query.
- Queries the signing oracle for .
- Outputs the forgery .
Verification accepts since and was never signed, exploiting the collision resistance failure (Tezuka et al., 2021).
The probability that returns (i.e., fails to find a collision) is bounded by
Thus,
A formal theorem states that, in CT-ROM, there exists a probabilistic polynomial-time adversary using a single CO and a single Sign query achieving this advantage, establishing the insecurity of RSA-FDH in CT-ROM.
5. Security Implications and Modeling in Proofs
The adoption of CT-ROM isolates collision resistance as a distinct and critical hash function property in security reductions. When a proof fails in CT-ROM but holds in ROM, this pinpoints collision resistance as the property on which security truly relies. CT-ROM thus supports rigorous analysis of schemes such as RSA-FDH and related variants, clarifying that their standard reductions are only meaningful if the hash function retains collision resistance (Tezuka et al., 2021).
By contrast, the SPT-ROM and FPT-ROM enable the analogous analysis for second-preimage and (first) preimage resistance, respectively. More generalizations, such as GFPT-ROM, further refine the model to analyze advanced attacks including chosen prefix collisions.
6. Context, Significance, and Extensions
CT-ROM originated from the general framework of weakened random oracle models proposed by Liskov (SAC 2006) and formalized by Numayama et al. (PKC 2008). Its importance lies in enabling precise cryptographic reductions and exposing vulnerabilities that are masked in the standard ROM. While theoretical in construction, the CT-ROM model has direct implications for assessing real-world schemes when instantiated with potentially collision-tractable hash functions.
Subsequent work by Tan and Wong introduced the generalized first-preimage tractable ROM (GFPT-ROM) to accommodate attacks such as the chosen prefix collision attack of Stevens et al. (EUROCRYPT 2007), and further extended the methodology to other nuanced weaknesses in hash function instantiations (Tezuka et al., 2021).
These frameworks collectively enable a fine-grained and property-specific evaluation of cryptographic constructions with respect to the concrete assumptions made about the underlying hash function.