2003
DOI: 10.1007/978-3-540-39927-8_28
|View full text |Cite
|
Sign up to set email alerts
|

Variations of Diffie-Hellman Problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
100
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 222 publications
(101 citation statements)
references
References 17 publications
1
100
0
Order By: Relevance
“…We are not going to study the possible reductions between MCDH problems, due to the fact that, essentially, any MCDH problem amounts to computing some polynomial on the elements of A, and it is then equivalent to CDH ( [4,23]), although the tightness of the reduction depends on the degree of the polynomial.…”
Section: The Matrix Diffie-hellman Computational Problemsmentioning
confidence: 99%
See 1 more Smart Citation
“…We are not going to study the possible reductions between MCDH problems, due to the fact that, essentially, any MCDH problem amounts to computing some polynomial on the elements of A, and it is then equivalent to CDH ( [4,23]), although the tightness of the reduction depends on the degree of the polynomial.…”
Section: The Matrix Diffie-hellman Computational Problemsmentioning
confidence: 99%
“…But unforgeability actually means the inability to produce one among many solutions to a given problem (e.g., in many signature schemes or zero knowledge proofs). Thus, unforgeability is more naturally captured by a flexible computational problem, namely, a problem which admits several solutions 4 . This maybe explains why several new flexible assumptions have appeared recently when considering "unforgeability-type" security notions in structure-preserving cryptography [2].…”
Section: Introductionmentioning
confidence: 99%
“…A similar assumption is also used in [13] to prove the security of the proposed anonymous fingerprinting scheme. And in [2], Bao et al prove that if the Computational DiffieHellman (CDH) assumption holds, there is no probabilistic polynomial time Turing machine that outputs g x −1 on inputs g and g x with non-negligible probability. Note that the CDH assumption states that there is no probabilistic polynomial-time Turing machine that outputs g xy on inputs g, g x , and g y with non-negligible probability.…”
Section: Security Analysismentioning
confidence: 99%
“…More precisely, in Protocol 1 this case is reduced to solve SCDH problem given DDH oracle, and in Protocol 2 reduced to solve SCDH problem. Also, note that CDH problem is equivalent to SCDH problem in prime order cyclic group G, see [2].…”
Section: Security Proofmentioning
confidence: 99%