Paper 2013/291
Security ranking among assumptions within the Uber assumption framework
Antoine Joux and Antoine Rojat
Abstract
Over the past decade bilinear maps have been used to build a large variety of cryptosystems. In parallel to new functionalities, we have also seen the emergence of many security assumptions. This leads to the general question of comparing two such assumptions. Boneh, Boyen and Goh introduced the Uber assumption as an attempt to offer a general framework for security assessment. Their idea is to propose a generic security assumption that can be specialized to suit the needs of any proof of protocols involving bilinear pairing. Even though the Uber assumption has been only stated in the bilinear setting, it can be easily restated to deal with ordinary Diffie-Hellman groups and assess other type of protocols. In this article, we explore some particular instances of the Uber assumption; namely the n-CDH-assumption, the nth-CDH-assumption and the Q-CDH-assumption. We analyse the relationships between those assumption and more precisely from a security point of view. Our analysis does not rely on any special property of the considered group(s) and does not use the generic group model.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Minor revision. ISC 2013
- Keywords
- Diffie-HellmanComputationalReductionGroupsPairingAdversarial Oracle
- Contact author(s)
- antoine rojat @ prism uvsq fr
- History
- 2013-11-24: revised
- 2013-05-23: received
- See all versions
- Short URL
- https://ia.cr/2013/291
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/291, author = {Antoine Joux and Antoine Rojat}, title = {Security ranking among assumptions within the Uber assumption framework}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/291}, year = {2013}, url = {https://eprint.iacr.org/2013/291} }