The Group Diffie-Hellman Problems
In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cryptographic schemes for practical purposes. The Group Computational and the Group Decisional Diffie- Hellman assumptions not only enable one to construct efficient pseudorandom functions but also to naturally extend the Diffie-Hellman protocol to allow more than two parties to agree on a secret key. In this paper we provide results that add to our confidence in the GCDH problem. We reach this aim by showing exact relations among the GCDH, GDDH, CDH and DDH problems.
- 2.S. Blake-Wilson, D. Johnson, and A. Menezes. Key agreement protocols and their security analysis. In M. Darnell, editor, Proc. of 6th IMA International Conference on Crypotography and Coding, volume 1355 of LNCS, pages 30–45. Springer-Verlag, 1997.Google Scholar
- 3.S. Blake-Wilson and A. Menezes. Authenticated Diffie-Hellman key agreement protocols. In H. Meijer and S. Tavares, editors, Proc. of Selected Areas in Cryptography SAC’ 98, volume 1556 of LNCS, pages 339–361. Springer-Verlag, August 1998.Google Scholar
- 4.Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In Proc. of ACM CCS’ 93, pages 62–73. ACM Press, November 1993.Google Scholar
- 5.D. Boneh. The decision Diffie-Hellman problem. In J. P. Buhler, editor, Proc. of the 3 rd ANTS Symposium, volume 1423 of LNCS, pages 48–63, Portland, OR, USA, June 1998. Springer-Verlag.Google Scholar
- 6.E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably authenticated group Diffie-Hellman key exchange. In P. Samarati, editor, Proc. of ACM CCS’ 01, pages 255–264. ACM Press, November 2001.Google Scholar
- 7.E. Bresson, O. Chevassut, and D. Pointcheval. Provably authenticated group Diffie-Hellman key exchange-the dynamic case. In C. Boyd, editor, Proc. of Asiacrypt’ 01, volume 2248 of LNCS, pages 290–309. Springer-Verlag, December 2001. Full Version available at http://www.di.ens.fr/users/pointche.Google Scholar
- 8.E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic group Diffie-Hellman key exchange under standard assumptions. In L. R. Knudsen, editor, Proc. of Eurocrypt’ 02, volume 2332 of LNCS, pages 321–336. Springer-Verlag, May 2002. Full Version available at http://www.di.ens.fr/users/pointche.Google Scholar
- 9.E. Bresson, O. Chevassut, and D. Pointcheval. Group diffie-hellman key exchange secure against dictionary attacks. In Y. Zheng, editor, Proc. of Asiacrypt’ 2002. Springer, December 2002. Full Version available at http://www.di.ens.fr/users/pointche.
- 10.R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Proc. of Crypto’ 98, volume 1462 of LNCS, pages 13–25. Springer-Verlag, August 1998.Google Scholar
- 12.T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Proc. of Crypto’ 84, LNCS 196, pp. 10–18.Google Scholar
- 13.M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudorandom functions. In Proc. of FOCS’ 97, pages 458–467. IEEE Computer Society Press, October 1997.Google Scholar
- 15.V. Shoup. On formal models for secure key exchange. Technical Report RZ 3120, IBM Zürich Research Lab, November 1999.Google Scholar
- 16.M. Steiner, B. Pfitzmann, and M. Waidner. A formal model for multi-party group key agreement. PhD Thesis RZ 3383, IBM Research, April 2002.Google Scholar
- 17.M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman key distribution extended to group communication. In Proc. of ACM CCS’ 96, pages 31–37. ACM Press, March 1996.Google Scholar