You are looking at a specific version 20170303:084709 of this paper. See the latest version.

Paper 2016/1189

On the Bit Security of Elliptic Curve Diffie--Hellman

Barak Shani

Abstract

This paper gives the first bit security result for the elliptic curve Diffie--Hellman key exchange protocol for elliptic curves defined over prime fields. About $5/6$ of the most significant bits of the $x$-coordinate of the Diffie--Hellman key are as hard to compute as the entire key. A similar result can be derived for the $5/6$ lower bits. The paper also generalizes and improves the result for elliptic curves over extension fields, that shows that computing one component (in the ground field) of the Diffie--Hellman key is as hard to compute as the entire key.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A minor revision of an IACR publication in PKC 2017
DOI
10.1007/978-3-662-54365-8_15
Keywords
hidden number problembit securityelliptic curve Diffie--Hellman
Contact author(s)
barak shani @ auckland ac nz
History
2017-04-26: last of 2 revisions
2017-01-01: received
See all versions
Short URL
https://ia.cr/2016/1189
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.