Mathematical preliminaries of crypto Discrete Logarithm
نویسنده
چکیده
is the exponentiation operation. Moreover, if h = gx then we say that x is the discrete logarithm of h on basis g, and write x = logg h. The discrete logarithm assumption in a cyclic finite group G of order p is that given a generator g of G and a randomly generated element h of G, it is computationally infeasible to find logg h. To formalize this, we need to define infeasibility. Thus, more formally, the discrete logarithm assumption in G is (τ, σ, ε)-hard, if for any probabilistic polynomial-time adversary A that runs in time τ and requires at most σ space (in some fixed machine model), the probability that the next experiment returns 1 is at most ε:
منابع مشابه
Applications and Benefits of Elliptic Curve Cryptography
This paper covers relatively new and emerging subject of the elliptic curve crypto systems whose fundamental security is based on the algorithmically hard discrete logarithm problem. Work includes the study of the following issues: mathematical background of the elliptic curve crypto systems, discrete logarithm problem, practical use cases in the industry, common implementation mistakes, perfor...
متن کاملGeneralized Jacobian and Discrete Logarithm Problem on Elliptic Curves
Let E be an elliptic curve over the finite field F_{q}, P a point in E(F_{q}) of order n, and Q a point in the group generated by P. The discrete logarithm problem on E is to find the number k such that Q = kP. In this paper we reduce the discrete logarithm problem on E[n] to the discrete logarithm on the group F*_{q} , the multiplicative group of nonzero elements of Fq, in the case where n | q...
متن کاملCurves, Cryptography and Coding theory
2 Basic Cryptography 3 2.1 Preliminaries: Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Modern Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2.1 Block Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2.2 Moving forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملHOW SAGE HELPS TO IMPLEMENT GOPPA CODES AND THE McELIECE PUBLIC KEY CRYPTO SYSTEM
Common cryptographic methods, especially Public Key Crypto Systems, PKCS based on difficulty to factor large integers or to compute the discrete logarithm, commonly deployed today will not resist attacks using quantum computers once these are operational. However, there are alternatives like hash based digital signature schemes, lattice based cryptography, or multivariatequadratic-equations pub...
متن کامل