Cryptology ePrint Archive: Report 2013/291

Security ranking among assumptions within the Uber assumption framework

Antoine Joux and Antoine Rojat

Abstract: Over the past decade bilinear maps have been used to build a large variety of cryptosystems. In parallel to new functionalities, we have also seen the emergence of many security assumptions. This leads to the general question of comparing two such assumptions. Boneh, Boyen and Goh introduced the Uber assumption as an attempt to offer a general framework for security assessment. Their idea is to propose a generic security assumption that can be specialized to suit the needs of any proof of protocols involving bilinear pairing. Even though the Uber assumption has been only stated in the bilinear setting, it can be easily restated to deal with ordinary Diffie-Hellman groups and assess other type of protocols. In this article, we explore some particular instances of the Uber assumption; namely the n-CDH-assumption, the nth-CDH-assumption and the Q-CDH-assumption. We analyse the relationships between those assumption and more precisely from a security point of view. Our analysis does not rely on any special property of the considered group(s) and does not use the generic group model.

Category / Keywords: Diffie-Hellman, Computational, Reduction, Groups, Pairing, Adversarial Oracle

Original Publication (with minor differences): ISC 2013

Date: received 16 May 2013, last revised 24 Nov 2013

Contact author: antoine rojat at prism uvsq fr

Available format(s): PDF | BibTeX Citation

Version: 20131124:142209 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]