A Note on Security Proofs in the Generic Model
نویسنده
چکیده
A discrete-logarithm algorithm is called generic if it does not exploit the specific representation of the cyclic group for which it is supposed to compute discrete logarithms. Such algorithms include the well-known Baby-Step-Giant-Step procedure as well as the PohligHellman algorithm. In particular, these algorithms match a lower bound of Nachaev showing that generic discrete-log algorithms require exponentially many group operations. Building on this lower bound, Shoup and subsequently Schnorr and Jakobsson proved other discrete-log-based protocols to be intractable in the generic model. Here, we discuss pitfalls when applying the generic model to other schemes than the discrete-log problem and when interpreting such lower bounds as security proofs for these schemes.
منابع مشابه
Automated Proofs for Asymmetric Encryption: First results in the random oracle model
Chosen-ciphertext security is by now a standard security property for asymmetric encryption. Many generic constructions for building secure cryptosystems from primitives with lower level of security have been proposed. Providing security proofs has also become standard practice. There is, however, a lack of automated verification procedures that analyse such cryptosystems and provide security p...
متن کاملReview of the morphology, ecology, and distribution of geckos of the genus Cyrtopodion, with a note on generic placement of Cyrtopodion brachykolon Krysko et. al., 2007
The genus Cyrtopodion is the most widely distributed of the four gekkonid genera of the angular-toed geckos that inhabit Pakistan and the contiguous Palearctic Region (Szczerbak & Golubev 1996), from the Indus Valley to the eastern borders of the Caspian Sea. Longitudinal rows of trihedral tubercles characteristically line the dorsum of these angular-toed geckos. They primarily inhabit arid bad...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملA note on superspecial and maximal curves
In this note we review a simple criterion, due to Ekedahl, for superspecial curves defined over finite fields.Using this we generalize and give some simple proofs for some well-known superspecial curves.
متن کاملA Note on Twists of (y^2=x^3+1)
‎‎In the category of Mordell curves (E_D:y^2=x^3+D) with nontrivial torsion groups we find curves of the generic rank two as quadratic twists of (E_1), ‎and of the generic rank at least two and at least three as cubic twists of (E_1). ‎Previous work‎, ‎in the category of Mordell curves with trivial torsion groups‎, ‎has found infinitely many elliptic curves with ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000