Papers
Topics
Authors
Recent
Search
2000 character limit reached

CT-ROM: Collision-Tractable Random Oracle Model

Updated 4 February 2026
  • CT-ROM is a variant of the Random Oracle Model that explicitly allows an adversary to query a collision oracle, thereby breaking collision resistance while maintaining preimage properties.
  • It is used to precisely analyze cryptographic schemes like RSA-FDH by modeling how collision vulnerabilities can be exploited in security reductions.
  • CT-ROM is integral for isolating the role of collision resistance in cryptographic proofs, guiding the design and assessment of secure hash function instantiations.

The Collision–Tractable Random Oracle Model (CT–@@@@1@@@@) is a weakened variant of the standard Random Oracle Model (ROM) in cryptographic security proofs. CT-ROM modifies the classical idealization of a hash function by allowing an adversary not only to query a Random Oracle (RO) but also to query an additional oracle that enables the adversary to efficiently find hash collisions. This model is pivotal for precisely identifying the role that collision resistance plays in the security of cryptographic schemes and for capturing the impact of broken collision resistance in security reductions (Tezuka et al., 2021).

1. Formal Definition and Oracles

Let h ⁣:XYh \colon X \rightarrow Y denote a family of hash functions, with X=2|X|=2^\ell and Y=2k|Y|=2^k. In the CT-ROM(,k)_{(\ell,k)}, an adversary A\mathcal{A} interacts with two idealized oracles:

  • Random Oracle (ROh\mathrm{RO}^h): On query xXx\in X, if (x,y)(x,y) exists in the internal table Th\mathbb{T}_h, yy is returned. Otherwise, yy is sampled uniformly at random from YY, (x,y)(x,y) is stored in Th\mathbb{T}_h, and yy is returned.
  • Collision Oracle (COh\mathrm{CO}^h): On a query with no input, a uniform (x,y)Th(x,y)\in\mathbb{T}_h is selected. If there exists xxx'\neq x with (x,y)Th(x',y)\in\mathbb{T}_h, such an xx' is selected uniformly at random and the collision (x,x)(x, x') is returned. If no such xx' exists, it returns \perp.

Table 1: Oracle Access in ROM Variants

Model Random Oracle (ROh\mathrm{RO}^h) Additional Oracle
ROM(,k)_{(\ell,k)} Yes None
CT-ROM(,k)_{(\ell,k)} Yes COh\mathrm{CO}^h (Collision Oracle)
SPT-ROM(,k)_{(\ell,k)} Yes SPOh\mathrm{SPO}^h (Second-Preimage)
FPT-ROM(,k)_{(\ell,k)} Yes FPOh\mathrm{FPO}^h (First-Preimage)

The CT-ROM explicitly breaks collision resistance by equipping the adversary with a collision-finding capability, while leaving second- and first-preimage resistance idealized (Tezuka et al., 2021).

2. Security Games and Definitions

The existential-unforgeability under chosen-message attack (EUF-CMA) game for a signature scheme Π=(KeyGen,Sign,Verify)\Pi = (\textsf{KeyGen}, \textsf{Sign}, \textsf{Verify}) in the CT-ROM is defined as follows:

  1. The challenger generates keys (sk,vk)KeyGen(1k)(sk, vk)\leftarrow \textsf{KeyGen}(1^k) and gives vkvk to A\mathcal{A}.
  2. A\mathcal{A} may adaptively make:
    • Signing queries on messages mm to receive σSign(sk,m)\sigma \leftarrow \textsf{Sign}(sk,m).
    • RO queries on xx to receive ROh(x)\mathrm{RO}^h(x).
    • CO queries to receive COh()\mathrm{CO}^h().
  3. A\mathcal{A} outputs (m,σ)(m^*, \sigma^*) and wins if Verify(vk,m,σ)=1\textsf{Verify}(vk, m^*, \sigma^*)=1 and mm^* was not submitted to the signing oracle.

The adversary's advantage in this game is

AdvΠ,CTEUFCMA(A)=Pr[A wins in GameΠEUFCMACTROM(A)].\mathrm{Adv}^{\mathrm{EUF-CMA}}_{\Pi,\mathrm{CT}}(\mathcal{A}) = \Pr[\mathcal{A} \text{ wins in } \text{Game}_{\Pi}^{\mathrm{EUF-CMA-CT-ROM}}(\mathcal{A})].

Collision-tractability is defined via the advantage

AdvCRCTROM(A)=Pr[((x,x)ARO,CO):xxRO(x)=RO(x)].\mathrm{Adv}^{\mathrm{CT-ROM}}_{\mathrm{CR}}(\mathcal{A}) = \Pr[((x,x')\leftarrow\mathcal{A}^{\mathrm{RO},\mathrm{CO}}): x\neq x' \wedge \mathrm{RO}(x) = \mathrm{RO}(x')].

A hash family is (t,q,ϵ)(t,q,\epsilon)–collision-tractable if a tt–time adversary using at most qq RO and CO queries achieves advantage at least ϵ\epsilon, with ϵ\epsilon non-negligible in kk (Tezuka et al., 2021).

Several weakened random oracle models (WROMs), as formalized by Numayama et al. and Tan and Wong, systematically capture the failure of specific hash function properties:

  • Standard ROM(,k)_{(\ell,k)}: Only ROh\mathrm{RO}^h is present. Both collision and (first or second) preimage resistance are unbroken and idealized.
  • CT-ROM(,k)_{(\ell,k)}: Adds COh\mathrm{CO}^h. Collision resistance is no longer idealized, but preimage properties are.
  • SPT-ROM(,k)_{(\ell,k)}: Replaces COh\mathrm{CO}^h by SPOh(x)\mathrm{SPO}^h(x), which returns xxx'\neq x with h(x)=h(x)h(x)=h(x'), breaking second-preimage resistance exclusively.
  • FPT-ROM(,k)_{(\ell,k)}: Replaces COh\mathrm{CO}^h by FPOh(y)\mathrm{FPO}^h(y), returning xx such that h(x)=yh(x)=y, capturing broken (first) preimage resistance only.

These distinctions allow security proofs to be precisely mapped to the minimal hash function property necessary for a scheme’s security (Tezuka et al., 2021).

4. Insecurity of RSA-FDH in the CT-ROM

The RSA Full Domain Hash (RSA-FDH) signature scheme, when analyzed in CT-ROM, is shown to be insecure due to the adversary’s access to the collision oracle.

  • RSA-FDH Scheme
    • KeyGen\textsf{KeyGen}: Standard RSA key generation (N,e,d)RSA(1k)(N, e, d) \leftarrow \textsf{RSA}(1^k); vk=(N,e)vk = (N, e), sk=dsk = d.
    • Sign(sk,m)\textsf{Sign}(sk, m): yROh(m)y \leftarrow \mathrm{RO}^h(m); σydmodN\sigma \leftarrow y^d \mod N.
    • Verify(vk,m,σ)\textsf{Verify}(vk, m, \sigma): Accept iff ROh(m)=σemodN\mathrm{RO}^h(m) = \sigma^e \mod N.

Using COh\mathrm{CO}^h, the adversary:

  1. Obtains a collision (m,m)(m, m') with ROh(m)=ROh(m)\mathrm{RO}^h(m) = \mathrm{RO}^h(m') using a single CO query.
  2. Queries the signing oracle for σSign(sk,m)\sigma \leftarrow \textsf{Sign}(sk, m).
  3. Outputs the forgery (m,σ)(m', \sigma).

Verification accepts since ROh(m)=σemodN\mathrm{RO}^h(m') = \sigma^e \mod N and mm' was never signed, exploiting the collision resistance failure (Tezuka et al., 2021).

The probability that COh\mathrm{CO}^h returns \perp (i.e., fails to find a collision) is bounded by

Pr[no collision]=(12k)21exp(212k).\Pr[\text{no collision}] = (1-2^{-k})^{2^\ell-1} \leq \exp\left( -\frac{2^\ell - 1}{2^k} \right).

Thus,

Pr[A forges]1exp(212k).\Pr[\mathcal{A} \text{ forges}] \geq 1 - \exp\left( -\frac{2^\ell - 1}{2^k} \right).

A formal theorem states that, in CT-ROM(,k)_{(\ell,k)}, there exists a probabilistic polynomial-time adversary A\mathcal{A} using a single CO and a single Sign query achieving this advantage, establishing the insecurity of RSA-FDH in CT-ROM.

5. Security Implications and Modeling in Proofs

The adoption of CT-ROM isolates collision resistance as a distinct and critical hash function property in security reductions. When a proof fails in CT-ROM but holds in ROM, this pinpoints collision resistance as the property on which security truly relies. CT-ROM thus supports rigorous analysis of schemes such as RSA-FDH and related variants, clarifying that their standard reductions are only meaningful if the hash function retains collision resistance (Tezuka et al., 2021).

By contrast, the SPT-ROM and FPT-ROM enable the analogous analysis for second-preimage and (first) preimage resistance, respectively. More generalizations, such as GFPT-ROM, further refine the model to analyze advanced attacks including chosen prefix collisions.

6. Context, Significance, and Extensions

CT-ROM originated from the general framework of weakened random oracle models proposed by Liskov (SAC 2006) and formalized by Numayama et al. (PKC 2008). Its importance lies in enabling precise cryptographic reductions and exposing vulnerabilities that are masked in the standard ROM. While theoretical in construction, the CT-ROM model has direct implications for assessing real-world schemes when instantiated with potentially collision-tractable hash functions.

Subsequent work by Tan and Wong introduced the generalized first-preimage tractable ROM (GFPT-ROM) to accommodate attacks such as the chosen prefix collision attack of Stevens et al. (EUROCRYPT 2007), and further extended the methodology to other nuanced weaknesses in hash function instantiations (Tezuka et al., 2021).

These frameworks collectively enable a fine-grained and property-specific evaluation of cryptographic constructions with respect to the concrete assumptions made about the underlying hash function.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Collision–Tractable Random Oracle Model (CT–ROM).