Skip to main content

On the Cryptographic Value of the qth Root Problem

  • Conference paper
Information and Communication Security (ICICS 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1726))

Included in the following conference series:

  • 483 Accesses

Abstract

We show that, for a prime q and a group G, if ord(G) = q k r, k>1, and r is smooth, then finding a qth root in G, is equivalent to the discrete logarithm problem over G (note that the discrete logarithm problem over the group G reduces to the discrete logarithm problem over a subgroup of order q – see reference [5]). Several publications describe techniques for computing qth roots (see [3] and [1]). All have the stated or implied requirement of computing discrete logarithm in a subgroup of order q.

The emphasis here will be on demonstrating that with a fairly general q th root oracle, discrete logarithms in a subgroup of order q may be found, describing the cryptographic significance of this problem, and in introducing two new public key signature schemes based on it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bach, E., Shallit, J.: Algorithmic Number Theory. Efficient Algorithms, vol. I, pp. 160–163. MIT Press, Cambridge (1996)

    MATH  Google Scholar 

  2. Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of Cryptology 1, 77–94 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  3. Johnston, A.: A Generalized qth Root Algorithm. In: Proc. of the Symp. on Discrete Algorithms, Baltimore Maryland (January 1999)

    Google Scholar 

  4. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  5. Pohlig, S., Hellman, M.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. on Information Theory 24, 106–110 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  6. Pollard, J.: Monte Carlo methods for index computation mod p. Math. of Computation 32, 918–924 (1978)

    MATH  MathSciNet  Google Scholar 

  7. Rabin, M.: Digitalized signatures and public key functions as intractable as factorization. MIT/LCS/TR-212, MIT Laboratory for Computer Science (1979)

    Google Scholar 

  8. Rivest, R., Hellman, M., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Comm. of the ACM 21(2), 120–126 (1978)

    Article  MATH  Google Scholar 

  9. Shanks D.: Solved and unsolved problems in Number Theory. Washington, D.C., Spartan (1962)

    Google Scholar 

  10. Williams, H.: A refinement of H.C. Williams’ qth root algorithm. Math. Comp. 61(203), 475–483 (1993)

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Beaver, C.L., Gemmell, P.S., Johnston, A.M., Neumann, W. (1999). On the Cryptographic Value of the qth Root Problem. In: Varadharajan, V., Mu, Y. (eds) Information and Communication Security. ICICS 1999. Lecture Notes in Computer Science, vol 1726. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-47942-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-47942-0_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66682-0

  • Online ISBN: 978-3-540-47942-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics