DC Field | Value | Language |
---|---|---|
dc.contributor.author | Roh, Dong-Young | ko |
dc.contributor.author | Hahn, Sang-Geun | ko |
dc.date.accessioned | 2013-03-11T08:04:04Z | - |
dc.date.available | 2013-03-11T08:04:04Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2010-09 | - |
dc.identifier.citation | INFORMATION PROCESSING LETTERS, v.110, no.18-19, pp.799 - 802 | - |
dc.identifier.issn | 0020-0190 | - |
dc.identifier.uri | http://hdl.handle.net/10203/98722 | - |
dc.description.abstract | Boneh and Venkatesan proposed a problem called the hidden number problem and they gave a polynomial time algorithm to solve it. And they showed that one can compute g(xy) from g(x) and g(y) if one has an oracle which computes roughly root log p most significant bits of g(xy) from given g(x) and g(y) in F(p) by using an algorithm for solving the hidden number problem. Later, Shparlinski showed that one can compute g(x2) if one can compute roughly root log p most significant bits of g(x2) from given g(x). In this paper we extend these results by using some improvements on the hidden number problem and the bound of exponential sums. We show that for given g, g(alpha),...g(alpha l) is an element of F(p)*, computing about root log p most significant bits of g(1/alpha) is as hard as computing g(1/alpha) itself, provided that the multiplicative order of g is prime and not too small. Furthermore, we show that we can do it when g has even much smaller multiplicative order in some special cases. (C) 2010 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.title | On the bit security of the weak Diffie-Hellman problem | - |
dc.type | Article | - |
dc.identifier.wosid | 000280935800002 | - |
dc.identifier.scopusid | 2-s2.0-77956240216 | - |
dc.type.rims | ART | - |
dc.citation.volume | 110 | - |
dc.citation.issue | 18-19 | - |
dc.citation.beginningpage | 799 | - |
dc.citation.endingpage | 802 | - |
dc.citation.publicationname | INFORMATION PROCESSING LETTERS | - |
dc.contributor.localauthor | Hahn, Sang-Geun | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Hidden number problem | - |
dc.subject.keywordAuthor | Weak Diffie-Hellman problem | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.