Cryptography Reference
In-Depth Information
1 so that Alice and Bob share the key 2 x . Prove that MSB 1 (2 x ) is a hardcore
1
x<p
bit.
[Hint: Suppose one has a perfect oracle A that on input g y outputs MSB 1 (2 y ). Then one
can store Bob's transmission g x and call A ( g x g y ) to get α 2 y , where α
2 x is the desired
=
hidden number. Then apply Lemma 21.7.3 .]
∈ F p be a primitive root and let > 0. Show that if one has a
perfect oracle for MSB 1 + ( g ab ) then one can solve DDH in
Exercise 21.7.13 Let g
F p .
21.7.3 Hard bits for CDH in other groups
F p where p is prime. It is natural
So far we have only considered CDH in (subgroups of)
F p m , in algebraic tori, in trace systems such as LUC and
XTR and in elliptic curves. The first issue is what is meant by “bits” of such a value. In
practice, elements in such a group are represented as an n -tuple of elements in
to consider CDH in subgroups of
F p and so
F p and take bits of it as done previously. When
p is small, one can consider a sequence of bits, each from different components. An early
reference for bit security of CDH in this setting is Verheul [ 555 ].
It is possible to extend the results to traces relatively easily. The idea is that if
it is natural to consider one component in
{
θ 1 ,...,θ m }
= j = 1 α j θ j is hidden and if t i = j = 1 t i,j θ j are known
then Tr( αt i ) is a linear equation in the unknown α i .Li,Naslund and Shparlinski [ 349 ]
have studied the bit security of CDH in LUC and XTR. We refer to Chapters 6 and 19 of
Shparlinski [ 499 ] for further details and references.
is a basis for
F p m over
F p ,if α
∈ F 2 m . Suppose
one has a perfect oracle A such that A ( g,g a ,g b ) returns the first coefficient of the normal
basis representation of g ab . Show how to use A to compute g ab . Hence, conclude that the
first coefficient is a hardcore bit for CDH in
F 2 m be represented using a normal basis and let g
Exercise 21.7.14 Let
F 2 m .
∈ F 2 m have prime order r>m . Sup-
pose one has a perfect oracle A such that A ( g,g a ,g b ) returns the constant coefficient of
the polynomial basis representation of g ab . Show how to use A to compute g ab . Hence,
conclude that the constant coefficient is a hardcore bit for CDH in
Exercise 21.7.15 Let
F 2 m
= F 2 [ x ] / ( F ( x )) and let g
F 2 m .
Hard bits for elliptic curve Diffie-Hellman
We now consider the case of elliptic curves E over
F q . A typical way to extract bits from
an elliptic curve point P is to consider the x -coordinate x ( P ) as an element of
F q and then
extract bits of this. It seems hard to give results for the bit security of CDH using an oracle
A ( P, [ a ] P, [ b ] P )
=
MSB k ( x ([ ab ] P )); the natural generalisation of the previous approach
is to call A ( P, [ a ] P
[ zb ] P )) but the problem is that it
is difficult to infer anything useful about x ([ ab ] P )from x ([ ab ] P
+
[ z ] P, [ b ] P )
=
MSB k ( x ([ ab ] P
+
+
[ zb ] P ) (similarly, for
Search WWH ::




Custom Search