Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation
نویسندگان
چکیده
We consider a generalisation of the hidden number problem recently introduced by Boneh and Venkatesan. The initial problem can be stated as follows: recover a number a ∈ Fp such that for many known random t ∈ Fp approximations to the values of batcp are known. Here we study a version of the problem where the “multipliers” t are not known but rather certain approximations to them are given. We present a probabilistic polynomial time solution when the error is small enough, and we show that the problem cannot be solved if the error is sufficiently large. We apply the result to the bit security of “timed-release crypto” introduced by Rivest, Shamir and Wagner, to noisy exponentiation black-boxes and to the bit security of the “inverse” exponentiation. We also show that it implies a certain bit security result for Weil pairing on elliptic curves.
منابع مشابه
Sending Message into a Deenite Future: Non-parallelizable Case
We construct a proof of membership protocol that uses log 2 t steps to prove an element to have the structure a 2 t (modn) given public values n; a; t where n is the product of two large secret primes. Such a proof serves a concrete basis of trust for a time-lock puzzle scheme and its applications in timed-release cryptography. The achieved ef-ciency expressed in log 2 t (number of modulo expon...
متن کاملSending Message into a De nite Future: Non-Parallelizable Case
We construct a proof of membership protocol that uses log2 t steps to prove an element to have the structure a t (modn) given public values n; a; t where n is the product of two large secret primes. Such a proof serves a concrete basis of trust for a time-lock puzzle scheme and its applications in timed-release cryptography. The achieved efciency expressed in log2 t (number of modulo exponentia...
متن کاملThe hidden number problem with non-prime modulus
Abstract We consider a generalization of the Hidden Number Problem for general moduli N , and prove that it can be solved with high probability if roughly 2(logN) aproximations of quality at least (logN) are given, and the multipliers are chosen uniformly at random from ZZ/NZZ. We prove a similar result in the case that the multipliers are chosen uniformly at random from (ZZ/NZZ) and N is the p...
متن کاملTime-lock puzzles and timed-release Crypto
Our motivation is the notion of \timed-release crypto," where the goal is to encrypt a message so that it can not be decrypted by anyone, not even the sender, until a pre-determined amount of time has passed. The goal is to \send information into the future." This problem was rst discussed by Timothy May [6]. What are the applications of \timed-release crypto"? Here are a few possibilities (som...
متن کاملQuantum Algorithms to Solve the Hidden Shift Problem for Quadratics and for Functions of Large Gowers Norm
Most quantum algorithms that give an exponential speedup over classical algorithms exploit the Fourier transform in some way. In Shor’s algorithm, sampling from the quantum Fourier spectrum is used to discover periodicity of the modular exponentiation function. In a generalization of this idea, quantum Fourier sampling can be used to discover hidden subgroup structures of some functions much mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Math. Comput.
دوره 72 شماره
صفحات -
تاریخ انتشار 2003