2016
DOI: 10.1007/978-3-662-49890-3_21
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of GGH Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0
1

Year Published

2016
2016
2019
2019

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 99 publications
(49 citation statements)
references
References 18 publications
0
48
0
1
Order By: Relevance
“…As discussed in the previous section, it likely follows that there exists a polynomial time quantum attack (and a subexponential classical attack) that recovers the secret element g from I. The second attack [HJ16] builds upon the first attack and classically breaks the key agreement. We recall the two attacks below.…”
Section: B2 Breaking the Key Agreement Of Ggh13mentioning
confidence: 99%
See 2 more Smart Citations
“…As discussed in the previous section, it likely follows that there exists a polynomial time quantum attack (and a subexponential classical attack) that recovers the secret element g from I. The second attack [HJ16] builds upon the first attack and classically breaks the key agreement. We recall the two attacks below.…”
Section: B2 Breaking the Key Agreement Of Ggh13mentioning
confidence: 99%
“…Now, on a classical computer, recovering g from I takes at least subexponential time. We describe below a classical polynomial-time attack of Hu and Jia against the key-agreement protocol [HJ16]. First assume that we recovered I as in the previous attack.…”
Section: B2 Breaking the Key Agreement Of Ggh13mentioning
confidence: 99%
See 1 more Smart Citation
“…For GGH13, the graded decisional Diffie-Hellman assumption from [10] was broken by Hu and Jia [18], in the same settings for which the initial zeroizing attack [10] applies (i.e., in the presence of low-level encodings of zero).…”
Section: Impact Of Our Attacksmentioning
confidence: 99%
“…This attack was called in [10] a "weak discrete-log attack". Recently, this attack was used by Hu and Jia [18] as a component in a new attack that breaks the key-exchange protocol from [10].…”
Section: Overview Of Existing Attacksmentioning
confidence: 99%