Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
نویسندگان
چکیده
The security of many cryptographic constructions relies on assumptions related to Discrete Logarithms (DL), e.g., the Diffie-Hellman, Square Exponent, Inverse Exponent or Representation Problem assumptions. In the concrete formalizations of these assumptions one has some degrees of freedom offered by parameters such as computational model, the problem type (computational, decisional) or success probability of adversary. However, these parameters and their impact are often not properly considered or are simply overlooked in the existing literature. In this paper we identify parameters relevant to cryptographic applications and describe a formal framework for defining DL-related assumptions. This enables us to precisely and systematically classify these assumptions. In particular, we identify a parameter, termed granularity, which describes the underlying probability space in an assumption. Varying granularity we discover the following surprising result: We prove that two DLrelated assumptions can be reduced to each other for medium granularity but we also show that they are provably not reducible with generic algorithms for high granularity. Further we show that reductions for medium granularity can achieve much better concrete security than equivalent high-granularity reductions.
منابع مشابه
On the relation generation method of Joux for computing discrete logarithms
In [Jou], Joux devised an algorithm to compute discrete logarithms between elements in a certain subset of the multiplicative group of an extension of the finite field Fpn in time polynomial in p and n. Shortly after, Barbulescu, Gaudry, Joux and Thome [BGJT] proposed a descent algorithm that in (pn)O(log n) time projects an arbitrary element in F pn as a product of powers of elements in the af...
متن کاملA Provably Secure Signature Scheme based on Factoring and Discrete Logarithms
To make users put much confidence in digital signatures, this paper proposes the first provably secure signature scheme based on both factoring and discrete logarithms. The new scheme incorporates both the Schnorr signature scheme and the PSS-Rabin signature scheme. Unless both the two cryptographic assumptions could be become solved simultaneously, anyone would not forge any signature. The pro...
متن کاملPublic-key cryptosystem design based on factoring and discrete logarithms - Computers and Digital Techniques, IEE Proceedings-
Most existing cryptosystem designs incorporate just one cryptographic assumption, such as factoring or discrete logarithms. These assumptions appear secure today; but, it is possible that efficient algorithms will be developed in the future lo break one or more of these assumptions. It is very unlikely that multiple cryptographic assumptions would simultaneously become easy to solve. Enhancing ...
متن کاملSecure Fingerprinting on Sound Foundations
The rapid development and the advancement of digital technologies open a variety of opportunities to consumers and content providers for using and trading digital goods. In this context, particularly the Internet has gained a major ground as a worldwide platform for exchanging and distributing digital goods. Beside all its possibilities and advantages digital technology can be misused to breach...
متن کاملCryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders
We generalize and improve the schemes of 4]. We introduce analogues of exponentiation and discrete logarithms in the principle cycle of real quadratic orders. This enables us to implement many cryptographic protocols based on discrete logarithms, e.g. a variant of the signature scheme of ElGamal 8].
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2002 شماره
صفحات -
تاریخ انتشار 2001