2018
DOI: 10.1007/s10623-018-0486-1
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial interpolation of the generalized Diffie–Hellman and Naor–Reingold functions

Abstract: In cryptography, for breaking the security of the Generalized Diffie-Hellman and Naor-Reingold functions, it would be sufficient to have polynomials with small weight and degree which interpolate these functions. We prove lower bounds on the degree and weight of polynomials interpolating these functions for many keys in several fixed points over a finite field.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…The proposed detection system is based on a range of techniques: private set intersection (PSI) [52], Cockoo tables [46], Secret sharing, Diffie-Helman problems [47] and hardness, Naor-Reingold Diffie-Hellman [43] random self reducibility, Coppersmith and Sudan Algorithm, Interleaved Reed-Solomon code under random noise and tuples. The idea of private set intersection refers a method primary set theory properties like A ∪ B.…”
Section: Csamdmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed detection system is based on a range of techniques: private set intersection (PSI) [52], Cockoo tables [46], Secret sharing, Diffie-Helman problems [47] and hardness, Naor-Reingold Diffie-Hellman [43] random self reducibility, Coppersmith and Sudan Algorithm, Interleaved Reed-Solomon code under random noise and tuples. The idea of private set intersection refers a method primary set theory properties like A ∪ B.…”
Section: Csamdmentioning
confidence: 99%
“…40 20652/92, Djavit An v. Turkey, 2003, § 56 is crucial 41 as is any other form of group 42 . To be included in the protection, the 'association' must have a private character 43 , but the state cannot speculate in nationalising it on purpose to remove the Article 11 protection 44 , or in reality prevent any ineffective exercise of the right 45 . Article 11 states that any intervention with the right must "prescribed by law", pursue legitimate aims and be "necessary in a democratic society".…”
Section: Freedom Of Assembly and Associationmentioning
confidence: 99%
“…In practice, subgroups of the multiplicative group of a finite field and elliptic curves over finite fields are mainly used. For these groups many results on polynomials representing and interpolating the univariate and bivariate Diffie-Hellman mapping have been obtained, in particular, lower bounds on degree and sparsity, see [3,4,5,6,8,9,12,13,14,21] and the monograph [18].…”
Section: Introductionmentioning
confidence: 99%