An Algebraic Framework for Diffie-Hellman Assumptions

被引:0
|
作者
Escala, Alex [1 ]
Herold, Gottfried [2 ,3 ]
Kiltz, Eike [2 ,3 ]
Rafols, Carla [2 ,3 ]
Villar, Jorge [4 ]
机构
[1] Univ Autonoma Barcelona, E-08193 Barcelona, Spain
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[3] Ruhr Univ Bochum, Fac Math, Bochum, Germany
[4] Univ Politecn Cataluna, E-08028 Barcelona, Spain
关键词
Diffie-Hellman Assumption; Groth-Sahai proofs; hash proof systems; public-key encryption; SECURE; ENCRYPTION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We put forward a new algebraic framework to generalize and analyze Diffie-Hellman like Decisional Assumptions which allows us to argue about security and applications by considering only algebraic properties. Our D-l,D-k-MDDH assumption states that it is hard to decide whether a vector in G(l) is linearly dependent of the columns of some matrix in G(lxk) sampled according to distribution D-l,D-k. It covers known assumptions such as DDH, 2-Lin (linear assumption), and k-Lin (the k-linear assumption). Using our algebraic viewpoint, we can relate the generic hardness of our assumptions in m-linear groups to the irreducibility of certain polynomials which describe the output of D-l,D-k. We use the hardness results to find new distributions for which the D-l,D-k-MDDH-Assumption holds generically in m-linear groups. In particular, our new assumptions 2-SCasc and 2-ILin are generically hard in bilinear groups and, compared to 2-Lin, have shorter description size, which is a relevant parameter for efficiency in many applications. These results support using our new assumptions as natural replacements for the 2-Lin Assumption which was already used in a large number of applications. To illustrate the conceptual advantages of our algebraic framework, we construct several fundamental primitives based on any MDDHAssumption. In particular, we can give many instantiations of a primitive in a compact way, including public-key encryption, hash-proof systems, pseudo-random functions, and Groth-Sahai NIZK and NIWI proofs. As an independent contribution we give more efficient NIZK and NIWI proofs for membership in a subgroup of G(l), for validity of ciphertexts and for equality of plaintexts. The results imply very significant efficiency improvements for a large number of schemes, most notably Naor-Yung type of constructions.
引用
收藏
页码:129 / 147
页数:19
相关论文
共 50 条
  • [1] An Algebraic Framework for Diffie-Hellman Assumptions
    Escala, Alex
    Herold, Gottfried
    Kiltz, Eike
    Rafols, Carla
    Villar, Jorge
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (01) : 242 - 288
  • [2] An Algebraic Framework for Diffie–Hellman Assumptions
    Alex Escala
    Gottfried Herold
    Eike Kiltz
    Carla Ràfols
    Jorge Villar
    [J]. Journal of Cryptology, 2017, 30 : 242 - 288
  • [3] The oracle Diffie-Hellman assumptions and an analysis of DHIES
    Abdalla, M
    Bellare, M
    Rogaway, P
    [J]. TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 143 - 158
  • [4] Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms
    Maurer, U
    Wolf, S
    [J]. 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 327 - 327
  • [5] Algebraic generalization of Diffie-Hellman key exchange
    Partala, Juha
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2018, 12 (01) : 1 - 21
  • [6] Diffie-Hellman to the rescue
    Tate, A
    [J]. DR DOBBS JOURNAL, 2001, 26 (06): : 12 - 12
  • [7] A note on chosen-basis Decisional Diffie-Hellman assumptions
    Szydlo, Michael
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2006, 4107 : 166 - 170
  • [8] An algebraic approach to the verification of a class of Diffie-Hellman protocols
    Rob Delicata
    Steve Schneider
    [J]. International Journal of Information Security, 2007, 6 : 183 - 196
  • [9] An algebraic approach to the verification of a class of Diffie-Hellman protocols
    Delicata, Rob
    Schneider, Steve
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (2-3) : 183 - 196
  • [10] The Diffie-Hellman protocol
    Maurer, UM
    Wolf, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 147 - 171