Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem

被引:0
|
作者
Akshima [1 ]
Besselman, Tyler [1 ]
Guo, Siyao [1 ]
Xie, Zhiye [1 ]
Ye, Yuping [1 ,2 ]
机构
[1] NYU Shanghai, Shanghai, Peoples R China
[2] ECNU, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Decisional Diffie-Hellman; Time-Space Tradeoffs in Cryptography; Generic Group Model; Hyperplane Query Model;
D O I
10.1145/3618260.3649752
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the (preprocessing) Decisional Diffie-Hellman (DDH) problem, we are given a cyclic group G with a generator g and a prime order N, and want to prepare some advice of S, such that we can efficiently distinguish (g(x),g(y),g(xy)) from (g(x),g(y),g(z)) in time T for uniformly and independently chosen x, y ,z from [N. This is a central cryptographic problem whose computational hardness underpins many widely deployed schemes such as the Diffie-Hellman key exchange protocol. We prove that any generic preprocessing DDH algorithm (operating in any cyclic group) achieves advantage at most O(ST2/N). This bound matches the best known attack up to poly-log factors, and confirms that DDH is as secure as the (seemingly harder) discrete logarithm problem against preprocessing attacks. Our result resolves an open question by Corrigan-Gibbs and Kogan (EURO-CRYPT 2018), which proved optimal bounds for many variants of discrete logarithm problems except DDH (with an (O) over tilde(root ST2/N) bound). We obtain our results by adopting and refining the approach by Gravin, Guo, Kwok, Lu (SODA 2021) and by Yun (EUROCRYPT 2015). Along the way, we significantly simplified and extended above techniques which may be of independent interests. The highlights of our techniques are following: We obtain a simpler reduction from decisional problems against S-bit advice to their S-wise XOR lemmas against zero-advice, recovering the reduction by Gravin, Guo, Kwok and Lu (SODA 2021). We show how to reduce generic hardness of decisional problems to their variants in the simpler hyperplane model proposed by Yun (EUROCRYPT 2015). This is the first work analyzing a decisional problem in Yun's model, answering an open problem proposed by Auerbach, Hoffman, and Pascual-Perez (TCC 2023). We prove an S-wise XOR lemma of DDH in Yun's model. As a corollary, we obtain the generic hardness of the S-XOR DDH problem.
引用
收藏
页码:1739 / 1749
页数:11
相关论文
共 50 条
  • [11] The l-th power Diffie-Hellman problem and the l-th root Diffie-Hellman problem
    Roh, Dongyoung
    Kim, I-Yeol
    Hahn, Sang Geun
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (01) : 41 - 57
  • [12] Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
    Wen, Yunhua
    Liu, Shengli
    Han, Shuai
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (11) : 2495 - 2512
  • [13] On the bit security of the weak Diffie-Hellman problem
    Dongyoung, Roh
    Geun, Hahn Sang
    INFORMATION PROCESSING LETTERS, 2010, 110 (18-19) : 799 - 802
  • [14] Security analysis of the strong Diffie-Hellman problem
    Cheon, Jung Hee
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 1 - 11
  • [15] Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
    Zhang, Fangguo
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 219 - 235
  • [16] On the connection between the discrete logarithms and the Diffie-Hellman problem
    Cherepnev, M.A.
    Discrete Mathematics and Applications, 6 (04):
  • [17] Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems
    Eu-Jin Goh
    Stanislaw Jarecki
    Jonathan Katz
    Nan Wang
    Journal of Cryptology, 2007, 20 : 493 - 514
  • [18] The Diffie-Hellman problem and generalization of Verheul's theorem
    Moody, Dustin
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 52 (03) : 381 - 390
  • [19] Signed (Group) Diffie-Hellman Key Exchange with Tight Security
    Pan, Jiaxin
    Qian, Chen
    Ringerud, Magnus
    JOURNAL OF CRYPTOLOGY, 2022, 35 (04)
  • [20] Efficient signature schemes with tight reductions to the Diffie-Hellman problems
    Goh, Eu-Jin
    Jarecki, Stanislaw
    Katz, Jonathan
    Wang, Nan
    JOURNAL OF CRYPTOLOGY, 2007, 20 (04) : 493 - 514