A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function

نویسنده

  • Eike Kiltz
چکیده

Given a cyclic group G and a generator g, the Diie-Hellman function (DH) maps two group elements (g a ; g b) to g ab. For many groups G this function is assumed to be hard to compute. We generalize this function to the P-Diie-Hellman function (P-DH) that maps two group elements (g a ; g b) to g P (a;b) for a (non-linear) polynomial P in a and b. In this paper we show that computing DH is computational equivalent to computing P-DH. In addition we study the corresponding decision problem for the function P-DH. In sharp contrast to the computational case the decision problems for DH and P-DH can be shown to be not generically equivalent for most polynomials P. Furthermore we show that there is no generic algorithm that computes or decides the P-DH function in polynomial time.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Correlated-Input Secure Hash Functions

We undertake a general study of hash functions secure under correlated inputs, meaning that security should be maintained when the adversary sees hash values of many related high-entropy inputs. Such a property is satisfied by a random oracle, and its importance is illustrated by study of the “avalanche effect,” a well-known heuristic in cryptographic hash function design. One can interpret “se...

متن کامل

Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security

Since its introduction, pseudorandom functions (PRFs) have become one of the main building blocks of cryptographic protocols. In this work, we revisit two recent extensions of standard PRFs, namely multilinear and aggregate PRFs, and provide several new results for these primitives. In the case of aggregate PRFs, one of our main results is a proof of security for the Naor-Reingold PRF with resp...

متن کامل

Identity-Based Encryption from the Diffie-Hellman Assumption

We provide the first constructions of identity-based encryption and hierarchical identitybased encryption based on the hardness of the (Computational) Diffie-Hellman Problem (without use of groups with pairings) or Factoring. Our construction achieves the standard notion of identity-based encryption as considered by Boneh and Franklin [CRYPTO 2001]. We bypass known impossibility results using g...

متن کامل

Diffie-Hellman type key exchange protocols based on isogenies

‎In this paper‎, ‎we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves‎. ‎The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $‎, ‎is a straightforward generalization of elliptic curve Diffie-Hellman key exchange‎. ‎The method uses commutativity of the endomorphism ring $ End(E) $‎. ‎Then using dual isogenies‎, ‎we propose...

متن کامل

Optimal Reductions of Some Decisional Problems to the Rank Problem

In the last years the use of large matrices and their algebraic properties proved to be useful to instantiate new cryptographic primitives like Lossy Trapdoor Functions and encryption schemes with improved security, like Key Dependent Message resilience. In these constructions the rank of a matrix is assumed to be hard to guess when the matrix is hidden by elementwise exponentiation. This probl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001