TY - JOUR
T1 - A structural comparison of the computational difficulty of breaking discrete log cryptosystems
AU - Sakurai, Kouichi
AU - Shizuya, Hiroki
PY - 1998
Y1 - 1998
N2 - The complexity of breaking cryptosystems of which security is based on the discrete logarithm problem is explored. The cryptosystems mainly discussed are the Diffie-Hellman key exchange scheme (DH), the Bellare-Micali noninteractive oblivious transfer scheme (EM), the ElGamal public-key cryptosystem (EG), the Okamoto conference-key sharing scheme (CONF), and the Shamir 3-pass key-transmission scheme (3PASS). The obtained relation among these cryptosystems is that 3 PASS < CONF < EG =£" BM s DH, where <JJdenotes the polynomial-time functionally many-to-one reducibility, i.e., a function version of the <£ -reducibility. We further give some condition in which these algorithms have equivalent difficulty. One of such conditions suggest another advantage of the discrete logarithm associated with ordinary elliptic curves.
AB - The complexity of breaking cryptosystems of which security is based on the discrete logarithm problem is explored. The cryptosystems mainly discussed are the Diffie-Hellman key exchange scheme (DH), the Bellare-Micali noninteractive oblivious transfer scheme (EM), the ElGamal public-key cryptosystem (EG), the Okamoto conference-key sharing scheme (CONF), and the Shamir 3-pass key-transmission scheme (3PASS). The obtained relation among these cryptosystems is that 3 PASS < CONF < EG =£" BM s DH, where <JJdenotes the polynomial-time functionally many-to-one reducibility, i.e., a function version of the <£ -reducibility. We further give some condition in which these algorithms have equivalent difficulty. One of such conditions suggest another advantage of the discrete logarithm associated with ordinary elliptic curves.
KW - Computational number theory
KW - Cryptosystem
KW - Discrete logarithm
KW - Elliptic curves
KW - Key exchange
KW - Public-key cryptography
KW - Randomness
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=0003610767&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0003610767&partnerID=8YFLogxK
U2 - 10.1007/s001459900033
DO - 10.1007/s001459900033
M3 - Article
AN - SCOPUS:0003610767
VL - 11
SP - 29
EP - 43
JO - Journal of Cryptology
JF - Journal of Cryptology
SN - 0933-2790
IS - 1
ER -