A STRUCTURAL COMPARISON OF THE COMPUTATIONAL DIFFICULTY OF BREAKING DISCRETE LOG CRYPTOSYSTEMS

Citation
K. Sakurai et H. Shizuya, A STRUCTURAL COMPARISON OF THE COMPUTATIONAL DIFFICULTY OF BREAKING DISCRETE LOG CRYPTOSYSTEMS, Journal of cryptology, 11(1), 1998, pp. 29-43
Citations number
27
Categorie Soggetti
Computer Science Theory & Methods",Mathematics,"Computer Science Theory & Methods","Engineering, Eletrical & Electronic",Mathematics
Journal title
ISSN journal
09332790
Volume
11
Issue
1
Year of publication
1998
Pages
29 - 43
Database
ISI
SICI code
0933-2790(1998)11:1<29:ASCOTC>2.0.ZU;2-V
Abstract
The complexity of breaking cryptosystems of which security is based on the discrete logarithm problem is explored. The cryptosystems mainly discussed are the Diffie-Hellman key exchange scheme (DH), the Bellare -Micali noninteractive oblivious transfer scheme (BM), the ElGamal pub lic-key cryptosystem (EG), the Okamoto conference-key sharing scheme ( CONF), and the Shamir 3-pass key-transmission scheme (3 PASS). The obt ained relation among these cryptosystems is that3PASS less than or equ al to FP/m CONF less than or equal to FP/m EG = FP/m BM = FP/m DH, whe re less than or equal to FP/m denotes the polynomial-time functionally many-to-one reducibility, i.e., a function version of the less than o r equal to p/m-reducibility. We further give some condition in which t hese algorithms have equivalent difficulty. One of such conditions sug gest another advantage of the discrete logarithm associated with ordin ary elliptic curves.