Skip to main content

A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function

  • Conference paper
  • First Online:
Progress in Cryptology — INDOCRYPT 2001 (INDOCRYPT 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2247))

Included in the following conference series:

Abstract

Given a cyclic group G and a generator g, the Diffie-Hellman function (DH) maps two group elements (g a, g b) to g ab. For many groups G this function is assumed to be hard to compute. We generalize this function to the P-Diffie-Hellman function (P-DH) that maps two group elements (g a, g b) to g P(a,b) for a (non-linear) polynomial P in a and b. In this paper we show that computing DH is computationally equivalent to computing P-DH. In addition we study the corresponding decision problem. In sharp contrast to the computational case the decision problems for DH and P-DH can be shown to be not generically equivalent for most polynomials P. Furthermore we show that there is no generic algorithm that computes or decides the P-DH function in polynomial time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Burmester, Y. Desmedt, and J. Seberry. Equitable key escrow with limited time span (or, how to enforce time expiration cryptographically). In Advances in Cryptology-ASIACRYPT’ 98, pages 380–391, 1998.

    Google Scholar 

  2. D. Coppersmith and I. Shparlinski. On polynomial approximation of the Discrete Logarithm and the Diffie-Hellman mapping. Journal of Cryptology, 13(3):339–360, March 2000.

    Article  MATH  MathSciNet  Google Scholar 

  3. W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on information Theory, 22(6):644–654, 1976.

    Article  MATH  MathSciNet  Google Scholar 

  4. E. Kiltz. A tool box of cryptographic functions related to the Diffie-Hellman Function (full version). Manuscript, 2001.

    Google Scholar 

  5. U. Maurer and S. Wolf. Diffie-Hellman oracles. Proc. of CRYPTO’96. Lecture Notes in Computer Science, 1109:268–282, 1996.

    Google Scholar 

  6. A.-R. Sadeghi and M. Steiner. Assumptions related to discrete logarithms: Why subtleties make a real difference. In Advances in Cryptology-EUROCRYPT’ 01, pages 243–260, 2001.

    Google Scholar 

  7. V. Shoup. Lower bounds for discrete logarithms and related problems. In Advances in Cryptology-EUROCRYPT’ 97, pages 256–266, 1997.

    Google Scholar 

  8. I. Shparlinski. Security of most significant bits of g x 2. Inf. Proc. Letters, (to appear).

    Google Scholar 

  9. Stefan Wolf. Information-theoretically and Computionally Secure Key Agreement in Cryptography. PhD thesis, ETH Zürich, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kiltz, E. (2001). A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. In: Rangan, C.P., Ding, C. (eds) Progress in Cryptology — INDOCRYPT 2001. INDOCRYPT 2001. Lecture Notes in Computer Science, vol 2247. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45311-3_32

Download citation

  • DOI: https://doi.org/10.1007/3-540-45311-3_32

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43010-0

  • Online ISBN: 978-3-540-45311-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics