On the bit security of the weak Diffie-Hellman problem

被引:1
|
作者
Dongyoung, Roh [1 ]
Geun, Hahn Sang [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Dept Math Sci, Taejon, South Korea
关键词
Cryptography; Hidden number problem; Weak Diffie-Hellman problem;
D O I
10.1016/j.ipl.2010.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Boneh and Venkatesan proposed a problem called the hidden number problem and they gave a polynomial time algorithm to solve it. And they showed that one can compute g(xy) from g(x) and g(y) if one has an oracle which computes roughly root log p most significant bits of g(xy) from given g(x) and g(y) in F-p by using an algorithm for solving the hidden number problem. Later, Shparlinski showed that one can compute g(x2) if one can compute roughly root log p most significant bits of g(x2) from given g(x). In this paper we extend these results by using some improvements on the hidden number problem and the bound of exponential sums. We show that for given g, g(alpha),...g(alpha l) is an element of F-p*, computing about root log p most significant bits of g(1/alpha) is as hard as computing g(1/alpha) itself, provided that the multiplicative order of g is prime and not too small. Furthermore, we show that we can do it when g has even much smaller multiplicative order in some special cases. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:799 / 802
页数:4
相关论文
共 50 条
  • [21] On the connection between the discrete logarithms and the Diffie-Hellman problem
    Cherepnev, M.A.
    Discrete Mathematics and Applications, 6 (04):
  • [22] The Diffie-Hellman problem and generalization of Verheul's theorem
    Moody, Dustin
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 52 (03) : 381 - 390
  • [23] On the index of the Diffie-Hellman mapping
    Isik, Leyla
    Winterhof, Arne
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2022, 33 (05) : 587 - 595
  • [24] The group Diffie-Hellman problems
    Bresson, E
    Chevassut, O
    Pointcheval, D
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 325 - 338
  • [25] The Twin Bilinear Diffie-Hellman Inversion Problem and Applications
    Chen, Yu
    Chen, Liqun
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 113 - +
  • [26] Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    Chevalier, Y
    Küsters, R
    Rusinowitch, M
    Turuani, M
    FST TCS 2003: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, 2003, 2914 : 124 - 135
  • [27] On the distribution of the Diffie-Hellman pairs
    Shparlinski, IE
    FINITE FIELDS AND THEIR APPLICATIONS, 2002, 8 (02) : 131 - 141
  • [28] Security and efficiency trade-offs for elliptic curve Diffie-Hellman at the 128-bit and 224-bit security levels
    Nath, Kaushik
    Sarkar, Palash
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (01) : 107 - 121
  • [29] Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
    Schmidt, Benedikt
    Meier, Simon
    Cremers, Cas
    Basin, David
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 78 - 94
  • [30] An Alternative Diffie-Hellman Protocol
    Jarpe, Eric
    CRYPTOGRAPHY, 2020, 4 (01) : 1 - 10