Abstract
We show that, for a prime q and a group G, if ord(G) = q k r, k>1, and r is smooth, then finding a qth root in G, is equivalent to the discrete logarithm problem over G (note that the discrete logarithm problem over the group G reduces to the discrete logarithm problem over a subgroup of order q – see reference [5]). Several publications describe techniques for computing qth roots (see [3] and [1]). All have the stated or implied requirement of computing discrete logarithm in a subgroup of order q.
The emphasis here will be on demonstrating that with a fairly general q th root oracle, discrete logarithms in a subgroup of order q may be found, describing the cryptographic significance of this problem, and in introducing two new public key signature schemes based on it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bach, E., Shallit, J.: Algorithmic Number Theory. Efficient Algorithms, vol. I, pp. 160–163. MIT Press, Cambridge (1996)
Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of Cryptology 1, 77–94 (1988)
Johnston, A.: A Generalized qth Root Algorithm. In: Proc. of the Symp. on Discrete Algorithms, Baltimore Maryland (January 1999)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Pohlig, S., Hellman, M.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. on Information Theory 24, 106–110 (1978)
Pollard, J.: Monte Carlo methods for index computation mod p. Math. of Computation 32, 918–924 (1978)
Rabin, M.: Digitalized signatures and public key functions as intractable as factorization. MIT/LCS/TR-212, MIT Laboratory for Computer Science (1979)
Rivest, R., Hellman, M., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Comm. of the ACM 21(2), 120–126 (1978)
Shanks D.: Solved and unsolved problems in Number Theory. Washington, D.C., Spartan (1962)
Williams, H.: A refinement of H.C. Williams’ qth root algorithm. Math. Comp. 61(203), 475–483 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Beaver, C.L., Gemmell, P.S., Johnston, A.M., Neumann, W. (1999). On the Cryptographic Value of the qth Root Problem. In: Varadharajan, V., Mu, Y. (eds) Information and Communication Security. ICICS 1999. Lecture Notes in Computer Science, vol 1726. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-47942-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-47942-0_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66682-0
Online ISBN: 978-3-540-47942-0
eBook Packages: Springer Book Archive