Skip to main content
Top
Published in: Applicable Algebra in Engineering, Communication and Computing 1/2018

23-05-2017 | Original Paper

The l-th power Diffie–Hellman problem and the l-th root Diffie–Hellman problem

Authors: Dongyoung Roh, I-Yeol Kim, Sang Geun Hahn

Published in: Applicable Algebra in Engineering, Communication and Computing | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

There are many variants of the computational Diffie–Hellman problem that are necessary to provide security of many cryptographic schemes. Two of them are the square Diffie–Hellman problem and the square root Diffie–Hellman problem. Recently, the first and third authors proved that these two problems are polynomial-time equivalent under a certain condition (Roh and Hahn in Des Codes Cryptogr 62(2):179–187, 2011). In this paper, we generalize this result. We introduce the l-th power Diffie–Hellman problem and the l-th root Diffie–Hellman problem and show that these two problems are polynomial-time equivalent for \(l = O (\log p)\) under a condition similar to that of Roh and Hahn (2011), where p is the order of the underlying group.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Adleman, L., Manders, K., Miller, G.: On taking roots in finite fields. In: 18th Annual Symposium on Foundations of Computer Science, 175-178 (1977) Adleman, L., Manders, K., Miller, G.: On taking roots in finite fields. In: 18th Annual Symposium on Foundations of Computer Science, 175-178 (1977)
2.
go back to reference Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21, 149–177 (2008)MathSciNetCrossRefMATH Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21, 149–177 (2008)MathSciNetCrossRefMATH
3.
go back to reference Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. Lecture Notes in Computer Science, vol. 3152. Springer, Berlin (2004)MATH Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. Lecture Notes in Computer Science, vol. 3152. Springer, Berlin (2004)MATH
4.
go back to reference Burmester, M., Desmedt, Y., Seberry, J.: Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). Lecture Notes in Computer Science, vol. 1514. Springer, Berlin (1998)MATH Burmester, M., Desmedt, Y., Seberry, J.: Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). Lecture Notes in Computer Science, vol. 1514. Springer, Berlin (1998)MATH
6.
go back to reference Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. Lecture Notes in Computer Science, vol. 3152, pp. 56–72. Springer, Berlin (2004)MATH Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. Lecture Notes in Computer Science, vol. 3152, pp. 56–72. Springer, Berlin (2004)MATH
7.
go back to reference Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. Lecture Notes in Computer Science, vol. 1294, pp. 410–424. Springer, Berlin (1997)MATH Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. Lecture Notes in Computer Science, vol. 1294, pp. 410–424. Springer, Berlin (1997)MATH
9.
go back to reference ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)MathSciNetCrossRefMATH ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)MathSciNetCrossRefMATH
10.
go back to reference Kiltz, E.: A Tool Box of Cryptographic Functions Related to the Diffie–Hellman Function. Lecture Notes in Computer Science, vol. 2247. Springer, Berlin (2001)MATH Kiltz, E.: A Tool Box of Cryptographic Functions Related to the Diffie–Hellman Function. Lecture Notes in Computer Science, vol. 2247. Springer, Berlin (2001)MATH
11.
go back to reference Konoma, C., Mambo, M., Shizuya, H.: Complexity analysis of the cryptographic primitive problems through square-root exponent. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E87–A, 1083–1091 (2004) Konoma, C., Mambo, M., Shizuya, H.: Complexity analysis of the cryptographic primitive problems through square-root exponent. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E87–A, 1083–1091 (2004)
12.
go back to reference Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptogrphy. CRC Press, Boca Raton (1996)CrossRef Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptogrphy. CRC Press, Boca Raton (1996)CrossRef
13.
go back to reference Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E85–A, 481–484 (2002) Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E85–A, 481–484 (2002)
14.
go back to reference Maurer, U., Wolf, S.: Diffie–Hellman Oracles. Lecture Notes in Computer Science, pp. 268–282. Springer, Berlin (1996)MATH Maurer, U., Wolf, S.: Diffie–Hellman Oracles. Lecture Notes in Computer Science, pp. 268–282. Springer, Berlin (1996)MATH
17.
go back to reference Shanks, D.: Five number-theoretic algorithms, In: Proceedings the Second Manitoba Conference on Numerical Mathematics, pp. 51–70 (1973) Shanks, D.: Five number-theoretic algorithms, In: Proceedings the Second Manitoba Conference on Numerical Mathematics, pp. 51–70 (1973)
Metadata
Title
The l-th power Diffie–Hellman problem and the l-th root Diffie–Hellman problem
Authors
Dongyoung Roh
I-Yeol Kim
Sang Geun Hahn
Publication date
23-05-2017
Publisher
Springer Berlin Heidelberg
Published in
Applicable Algebra in Engineering, Communication and Computing / Issue 1/2018
Print ISSN: 0938-1279
Electronic ISSN: 1432-0622
DOI
https://doi.org/10.1007/s00200-017-0321-3

Other articles of this Issue 1/2018

Applicable Algebra in Engineering, Communication and Computing 1/2018 Go to the issue

Premium Partner