2014
DOI: 10.1112/s1461157014000230
|View full text |Cite
|
Sign up to set email alerts
|

The discrete logarithm problem for exponents of bounded height

Abstract: Let G be a cyclic group written multiplicatively (and represented in some concrete way). Let n be a positive integer (much smaller than the order of G). Let g, h ∈ G. The bounded height discrete logarithm problem is the task of finding positive integers a and b (if they exist) such that a n, b n and g a = h b . (Provided that b is coprime to the order of g,where a/b is a rational number of height at most n. This motivates the terminology.) The paper provides a reduction to the two-dimensional discrete logarith… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…For instance, a parallelized Pollard's Rho method was used in an attack on Certicom's challenge problem ECC2K-130 [2], while an attack based on Gaudry-Schost was used to break a proposed EMVco protocol to replace the chip-and-pin system used in over 1.6 billion payments cards [3].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, a parallelized Pollard's Rho method was used in an attack on Certicom's challenge problem ECC2K-130 [2], while an attack based on Gaudry-Schost was used to break a proposed EMVco protocol to replace the chip-and-pin system used in over 1.6 billion payments cards [3].…”
Section: Introductionmentioning
confidence: 99%
“…Two-dimensional discrete logarithm problem arises in a number of contexts, for example, in the computation of the group order of the Jacobian of curves [9], in the complexity analysis of solving the discrete logarithm problem for exponents of bounded height [2]. In general case, the Gaudry-Schost algorithm [9] is the most efficient algorithm for solving the two-dimensional discrete logarithm problem.…”
mentioning
confidence: 99%