On the bit security of the weak Diffie-Hellman problem

被引:1
作者
Dongyoung, Roh [1 ]
Geun, Hahn Sang [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Dept Math Sci, Taejon, South Korea
关键词
Cryptography; Hidden number problem; Weak Diffie-Hellman problem;
D O I
10.1016/j.ipl.2010.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Boneh and Venkatesan proposed a problem called the hidden number problem and they gave a polynomial time algorithm to solve it. And they showed that one can compute g(xy) from g(x) and g(y) if one has an oracle which computes roughly root log p most significant bits of g(xy) from given g(x) and g(y) in F-p by using an algorithm for solving the hidden number problem. Later, Shparlinski showed that one can compute g(x2) if one can compute roughly root log p most significant bits of g(x2) from given g(x). In this paper we extend these results by using some improvements on the hidden number problem and the bound of exponential sums. We show that for given g, g(alpha),...g(alpha l) is an element of F-p*, computing about root log p most significant bits of g(1/alpha) is as hard as computing g(1/alpha) itself, provided that the multiplicative order of g is prime and not too small. Furthermore, we show that we can do it when g has even much smaller multiplicative order in some special cases. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:799 / 802
页数:4
相关论文
共 12 条
  • [1] [Anonymous], 1996, LNCS, DOI DOI 10.1007/3-540-68697-511
  • [2] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
  • [3] Drmota M., 1997, SEQUENCES DISCREPANC
  • [4] Character sums with exponential functions
    Friedlander, JB
    Hansen, J
    Shparlinski, IE
    [J]. MATHEMATIKA, 2000, 47 (93-94) : 75 - 85
  • [5] Konyagin S. V., 1999, CHARACTER SUMS EXPON
  • [6] Mitsunari S, 2002, IEICE T FUND ELECTR, VE85A, P481
  • [7] The insecurity of the digital signature algorithm with partially known nonces
    Nguyen, PQ
    Shparlinski, IE
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 151 - 176
  • [8] A hidden number problem in small subgroups
    Shparlinski, I
    Winterhof, A
    [J]. MATHEMATICS OF COMPUTATION, 2005, 74 (252) : 2073 - 2080
  • [9] Security of most significant bits of gx2
    Shparlinski, IE
    [J]. INFORMATION PROCESSING LETTERS, 2002, 83 (02) : 109 - 113
  • [10] Vasco MIG, 2001, PROG COM SC, V20, P257