Cryptography Reference
In-Depth Information
tuples (i.e., the uniform distribution on tuples of the form ( g,g a ,g b ,g ab )
G 4 ) and the
uniform distribution on G 4 .
Definition 20.2.4 Let ( G n ,r n ) be a family of cyclic groups G n of order r n ,for n
.A
DDH algorithm for the family G n is an algorithm A that takes as input a quadruple in G n
and outputs “yes” or “no”. The advantage of the DDH algorithm A is
∈ N
= Pr A g,g a ,g b ,g ab =
Z
Adv( A )
yes ": g
G n ,a,b
← Z
/r
Pr A g,g a ,g b ,g c =
Z .
yes ": g
G n , a,b,c
← Z
/r
A DDH algorithm is called successful if the advantage is noticeable. The DDH assumption
for the family of groups is that all polynomial-time (i.e., running time O (log( r n ) c )forsome
constant c ) DDH algorithms have negligible advantage.
Lemma 20.2.5 DDH
R CDH
R DLP.
Exercise 20.2.6 Prove Lemma 20.2.5 .
Exercise 20.2.7 Definition 20.2.3 states that r is prime. Show that if ( g,g a ,g b ,g c )is
a quadruple of elements such that the order of g is n for some integer n where n has
some small factors (e.g., factors l
|
n such that l
log 2 ( n )) then one can eliminate some
quadruples ( g,g a ,g b ,g c )
G 4 that are not valid DDH tuples by reducing to DDH instances
in subgroups of prime order. Show that this is enough to obtain a successful DDH algorithm
according to Definition 20.2.4 .
20.2.2 Burmester-Desmedt key exchange
In the case of n> 2 participants there is a generalisation of Diffie-Hellman key exchange
due to Burmester and Desmedt [ 107 ] that requires two rounds of broadcast. Let the partic-
ipants in the protocol be numbered as player 0 to player n
1. In the first round, player i
g a i to the other players (or, at
(for 0
i<n ) chooses a random 1
a i <r and sends c i =
least, to player i
1(mod n ) and i
1(mod n )). In the second round, player i computes
t i = c i + 1(mod n ) c 1
+
1(mod n ) a i
i
and sends it to all other players. Finally, player i computes
c na i
i +
1(mod n ) t n 1
1(mod n ) t n 2
K
=
···
t i + n 1(mod n ) .
i +
i +
2(mod n )
Lemma 20.2.8 Each participant in the Burmester-Desmedt protocol computes
g a 0 a 1 + a 1 a 2 +··· a n 2 a n 1 + a n 1 a 0 .
K
=
Exercise 20.2.9 Prove Lemma 20.2.8 .
Search WWH ::




Custom Search