主流的密码学 hardness/computational 假设

1. Discrete logarithm problem

Let g g g为 a known element of prime order r r r in a group (with group operation written multiplicatively). Let G = < g > G=<g> G=<g> be the group generated by g g g.

常用的group选择有:

  • multiplicative group of a finite field;
  • algebraic torus over a finite field;
  • elliptic curve over a finite field;
  • divisor class group of a curve over a finite field。

Discrete logarithm problem常用假设有:

  • DLP: discrete logarithm problem。常用于Schnorr signatures, DSA signatures。
    已知 h ∈ G h\in G hG,找到 x x x使得 h = g x h=g^x h=gx

  • CDH: computational Diffie-Hellman problem。常用于 Diffie-Hellman key exchange and variants, Elgamal encryption and variants, BLS signatures and variants。
    已知 g a , g b ∈ G g^a,g^b\in G ga,gbG,计算 g a b g^{ab} gab

  • SDH: static Diffie-Hellman problem。
    Fix g , g a ∈ G g,g^a\in G g,gaG. Given h ∈ G h\in G hG,计算 h a h^a ha

  • gap-CDH: Gap Diffie-Hellman problem。常用于 ECIES proof in the Random Oracle Model, Chaum undeniable signature。
    已知 g a , g b ∈ G g^a,g^b\in G ga,gbG,计算 g a b g^{ab} gab,when the algorithm has access to an oracle which solves the DDH problem。

  • DDH: decision Diffie-Hellman problem。常用于 Diffie-Hellman key exchange and variants, Elgamal encryption and variants.
    已知 g a , g b , h ∈ G g^a,g^b,h\in G ga,gb,hG,判断 h = g a b h=g^{ab} h=gab是否成立?

  • Strong-DDH: strong decision Diffie-Hellman problem
    已知 g , g a , g b , g b − 1 , h ∈ G g,g^a,g^b,g^{b^{-1}},h\in G g,ga,gb,gb1,hG,判断 h = g a b h=g^{ab} h=gab是否成立?

  • sDDH: skewed decision Diffie-Hellman problem。
    Let f f f 为任意的uninvertible function with domain Z r \mathbb{Z}_r Zr。已知 f ( a ) , g b , h ∈ G f(a),g^b,h\in G f(a),gb,hG,判断 h = g a b h=g^{ab} h=gab是否成立?

  • PDDH: parallel decision Diffie-Hellman problem。
    已知 g x 1 , ⋯   , g x n , h 1 , ⋯   , h n ∈ G g^{x_1},\cdots,g^{x_n},h_1,\cdots,h_n\in G gx1,,gxn,h1,,hnG,判断 h 1 = g x 1 x 2 , ⋯   , h n − 1 = g x n − 1 x n , h n = g x n x 1 h_1=g^{x_1x_2},\cdots,h_{n-1}=g^{x_{n-1}x_n},h_n=g^{x_nx_1} h1=gx1x2,,hn1=gxn1xn,hn=gxnx1是否成立?

  • Square-DH: Square Diffie-Hellman problem. The best known algorithm for Square-DH is to actually solve the DLP.
    已知 g a ∈ G g^a\in G gaG,计算 g a 2 g^{a^2} ga2

  • l-DHI: l-Diffie-Hellman inversion problem. The best known algorithm for l-DHI is to actually solve the DHP.
    已知 g a , g a 2 , ⋯   , g a l ∈ G g^a,g^{a^2},\cdots,g^{a^l}\in G ga,ga2,,galG,计算 g 1 / a g^{1/a} g1/a

  • l-DDHI: l-Decisional Diffie-Hellman inversion problem
    已知 g a , g a 2 , ⋯   , g a l , v ∈ G g^a,g^{a^2},\cdots,g^{a^l},v\in G ga,ga2,,gal,vG,判断 v = g 1 / a v=g^{1/a} v=g1/a是否成立?

  • REPRESENTATION: Representation problem. The best known algorithm for REPRESENTATION is to solve the DLP.
    已知 g 1 , ⋯   , g k , h ∈ G g_1,\cdots,g_k,h\in G g1,,gk,hG,找到 a 1 , ⋯   , a k a_1,\cdots,a_k a1,,ak使得 h = g 1 a 1 ⋯ g k a k h=g_1^{a_1}\cdots g_k^{a_k} h=g1a1gkak成立。

  • LRSW: LRSW Problem. The best known algorithm for LRSW is to solve the DLP.
    已知 g , g x , g y g,g^x,g^y g,gx,gy,已知 oracle O O O(输入为 s s s,其选择一个随机值 a = g z a=g^z a=gz,然后其输出为 ( a , a s y , a x + s x y ) (a,a^{sy},a^{x+sxy}) (a,asy,ax+sxy)),对于任意的 t t t(not one of the 输入 s s s)和 b ≠ 1 b\neq 1 b=1值 计算 ( t , b , b t y , b x + t x y ) (t,b,b^{ty},b^{x+txy}) (t,b,bty,bx+txy)

  • Linear: Linear problem。The best known algorithm for Linear is to solve the DLP。
    已知 g a , g b , g a c , g b d ∈ G g^a,g^{b},g^{ac},g^{bd}\in G ga,gb,gac,gbdG,计算 g c + d g^{c+d} gc+d

  • D-Linear1: Decision Linear problem (version 1)
    已知 g a , g b , g a c , g b d , v ∈ G g^a,g^{b},g^{ac},g^{bd},v\in G ga,gb,gac,gbd,vG,判断 v = g c + d v=g^{c+d} v=gc+d是否成立?

  • l-SDH: l-Strong Diffie-Hellman problem
    已知 g a , g a 2 , ⋯   , g a l ∈ G g^a,g^{a^2},\cdots,g^{a^l}\in G ga,ga2,,galG,找到 w ∈ F q w\in F_q wFq并计算 g 1 / ( a + w ) g^{1/(a+w)} g1/(a+w)

  • c-DLSE: Discrete Logarithm with Short Exponents。The best known algorithm for the c-DLSE is to use the baby-step-giant-step or Pollard kangaroo algorithms for solving the DLP in a short interval. 常用于
    Gennaro pseudorandom generator。
    Let G = Z p ∗ G=\mathbb{Z}_p^* G=Zp 其中 p − 1 = 2 q p-1=2q p1=2q p , q p,q p,q均为primes,let c c c为integer。已知 g x m o d    p g^x \mod p gxmodp 0 ≤ x ≤ 2 c 0\leq x\leq 2^c 0x2c,求解相应的 x x x值。

  • CONF: (conference-key sharing scheme)。常用于Okamoto’s conference-key sharing scheme。
    已知 g a , g b , g a b ∈ G g^a,g^b,g^{ab}\in G ga,gb,gabG,计算 g b g^{b} gb

  • 3PASS: 3-Pass Message Transmission Scheme。常用于Shamir’s 3-pass message transmission scheme。
    已知 A , B , C ∈ G A,B,C\in G A,B,CG,找到相应的 s s s使得 A = s a , B = s b , C = s a b A=s^a,B=s^b,C=s^{ab} A=sa,B=sb,C=sab成立。

  • LUCAS: Lucas Problem。
    已知 p , z ∈ < V t ( m ) > p,z\in<V_t(m)> p,z<Vt(m)>,找到相应的 x x x,使得 V x ( m ) = z V_x(m)=z Vx(m)=z成立。其中 V t ( m ) V_t(m) Vt(m)的定义为: V 0 ( m ) = 2 , V 1 ( m ) = m , V t ( m ) = m V t − 1 ( m ) − V t − 2 ( m ) 。 V_0(m)=2,V_1(m)=m,V_t(m)=mV_{t-1}(m)-V_{t-2}(m)。 V0(m)=2,V1(m)=m,Vt(m)=mVt1(m)Vt2(m)

  • XLP: x-Logarithm Problem。
    对于Elliptic curve E ( F q ) E(\mathbb{F}_q) E(Fq)上的任意一点 P = ( x , y ) ∈ F q 2 P=(x,y)\in\mathbb{F}_q^2 P=(x,y)Fq2,将 x ( P ) = x ˉ x(P)=\bar{x} x(P)=xˉ 表示为 P P P点$ X坐标的二进制表示。对任意的group element g a g^a ga x = x ( g a ) x=x(g^a) x=x(ga),是否能区分 g a g^a ga g x g^x gx

  • MDHP: Matching Diffie-Hellman Problem。常用于E-Cash。
    Let g g g be a generator of group G G G having order q q q,let a 0 , b 0 , a 1 , b 1 ∈ Z q a_0,b_0,a_1,b_1\in\mathbb{Z}_q a0,b0,a1,b1Zq and r ∈ R { 0 , 1 } r\in_R\{0,1\} rR{0,1}。已知 ( g a 0 , g a 0 b 0 , g a 1 , g a 1 b 1 ) (g^{a_0},g^{a_0b_0},g^{a_1},g^{a_1b_1}) (ga0,ga0b0,ga1,ga1b1) ( g b r , g b 1 − r ) (g^{b_r},g^{b_{1-r}}) (gbr,gb1r),找到相应的 r r r

  • DDLP: Double Discrete Logarithm Problem。常用于Public verifiable secret sharing。
    Let p , q p,q p,q 为素数且 q = ( p − 1 ) / 2 q=(p-1)/2 q=(p1)/2,设置 G G G为group of order p p p with generator g g g h ∈ Z p ∗ h\in\mathbb{Z}_p^* hZp为an element of order q q q。已知 g , h , a = g ( h x ) g,h,a=g^{(h^x)} g,h,a=g(hx),求解 x x x

  • rootDLP: Root of Discrete Logarithm Problem。常用于Camenisch and Stadler group signature scheme。
    已知group generator g g g, positive integer e e e a ∈ G a\in G aG,计算 x x x使得 a = g ( x e ) a=g^{(x^e)} a=g(xe)成立。

  • n-M-DDH: Multiple Decision Diffie-Hellman Problem。常用于 Group key exchange。
    Let n ≥ 2 n\geq 2 n2 D = ( g x 1 , ⋯   , g x n , { g x i x j } 1 ≤ i < j ≤ n ) D=(g^{x_1},\cdots,g^{x_n},\{g^{x_ix_j}\}_{1\leq i< j\leq n}) D=(gx1,,gxn,{gxixj}1i<jn) 其中 x 1 , ⋯   , x n ∈ Z r x_1,\cdots,x_n\in\mathbb{Z}_r x1,,xnZr为随机值; D r a n d o m = ( g 1 , ⋯   , g n , { g i j } 1 ≤ i < j ≤ n ) D_{random}=(g_1,\cdots,g_n,\{g_{ij}\}_{1\leq i<j\leq n}) Drandom=(g1,,gn,{gij}1i<jn)为a random tuple in G G G。很难区分 D D D D r a n d o m D_{random} Drandom

  • l-HENSEL-DLP: l-Hensel Discrete Logarithm Problem。
    Let G G G为a subgroup or prime order r r r in Z p ∗ \mathbb{Z}_p^* Zp,其中 p p p为a prime with polynomial binary length;Let 1 < g < p 1<g<p 1<g<p be an integer满足 g r ≡ 1 ( m o d    p l − 1 ) , g r ≢ 1 m o d    p l ) g^r\equiv 1(\mod p^{l-1}),g^r\not\equiv 1\mod p^l) gr1(modpl1),gr1modpl),其中 l > 1 且 为 整 数 l>1且为整数 l>1。已知 g x m o d    p g^x \mod p gxmodp x x x [ 1 , r − 1 ] [1,r-1] [1,r1]范围内的随机数,计算 g x m o d    p l g^x \mod p^l gxmodpl

  • DLP(Inn(G)): Discrete Logarithm Problem over Inner Automorphism Group。常用于MOR Public Key Cryptosystem。
    已知 ϕ , ϕ s ∈ I n n ( G ) \phi,\phi^s\in Inn(G) ϕ,ϕsInn(G) for s ∈ Z s\in\mathbb{Z} sZ,求解 s ( m o d    ∣ ϕ ∣ ) s(\mod |\phi|) s(modϕ)

  • IE: Inverse Exponent。
    为l-DHI (l-Diffie-Hellman inversion problem) l = 1 l=1 l=1的特例情况。

  • TDH: The Twin Diffie-Hellman Assumption。
    Let G G G 为 a cyclic group with generator g g g,and of prime order q q q。定义 d h ( X , Y ) = Z dh(X,Y)=Z dh(X,Y)=Z,其中 X = g x , Y = g y , Z = g x y X=g^x,Y=g^y,Z=g^{xy} X=gx,Y=gy,Z=gxy。定义twin DH function 2 d h : G 3 → G 2   ( X 1 , X 2 , Y ) → ( d h ( X 1 , Y ) , d h ( X 2 , Y ) ) 2dh: G^3\rightarrow G^2\ (X_1,X_2,Y)\rightarrow (dh(X_1,Y),dh(X_2,Y)) 2dh:G3G2 (X1,X2,Y)(dh(X1,Y),dh(X2,Y))。定义相应的twin DH predicate为: 2 d h p ( X 1 , X 2 , Y ^ , Z ^ 1 , Z ^ 2 ) = 1   i f f   2 d h ( X 1 , X 2 , Y ^ ) = ( Z ^ 1 , Z ^ 2 ) 2dhp(X_1,X_2,\hat{Y},\hat{Z}_1,\hat{Z}_2)=1\ iff\ 2dh(X_1,X_2,\hat{Y})=(\hat{Z}_1,\hat{Z}_2) 2dhp(X1,X2,Y^,Z^1,Z^2)=1 iff 2dh(X1,X2,Y^)=(Z^1,Z^2)
    twin DH assumption是指:已知random X 1 , X 2 , Y ∈ G X_1,X_2,Y\in G X1,X2,YG,计算 2 d h ( X 1 , X 2 , Y ) 2dh(X_1,X_2,Y) 2dh(X1,X2,Y)很难。
    strong twin DH assumption是指:已知 X 1 , X 2 , Y ∈ G X_1,X_2,Y\in G X1,X2,YG along with access to a decision oracle for the predicate 2 d h p ( X 1 , X 2 , ⋅ , ⋅ , ⋅ ) 2dhp(X_1,X_2,\cdot,\cdot,\cdot) 2dhp(X1,X2,,,) which on input ( Y ^ , Z ^ 1 , Z ^ 2 ) (\hat{Y},\hat{Z}_1,\hat{Z}_2) (Y^,Z^1,Z^2) returns 2 d h p ( X 1 , X 2 , Y ^ , Z ^ 1 , Z ^ 2 ) 2dhp(X_1,X_2,\hat{Y},\hat{Z}_1,\hat{Z}_2) 2dhp(X1,X2,Y^,Z^1,Z^2),计算 2 d h ( X 1 , X 2 , Y ) 2dh(X_1,X_2,Y) 2dh(X1,X2,Y)很难。

  • XTR-DL: XTR discrete logarithm problem。Most protocols based on DLP can be used with XTR.
    Let T r ( g ) Tr(g) Tr(g) 为an XTR representation of an element of the XTR subgroup of F p 6 ∗ \mathbb{F}_{p^6}^* Fp6,已知 t t t,求解 x x x使得 t = T r ( g x ) t=Tr(g^x) t=Tr(gx)成立。

  • XTR-DH: XTR Diffie-Hellman problem。Most protocols based on DLP can be used with XTR.
    Let T r ( g ) Tr(g) Tr(g) 为an XTR representation of an element of the XTR subgroup of F p 6 ∗ \mathbb{F}_{p^6}^* Fp6,已知 t 1 , t 2 t_1,t_2 t1,t2,求解 t 3 t_3 t3使得 t 1 = T r ( g x ) , t 2 = T r ( g y ) , t 3 = T r ( g x y ) t_1=Tr(g^x),t_2=Tr(g^y),t_3=Tr(g^{xy}) t1=Tr(gx),t2=Tr(gy),t3=Tr(gxy)成立。

  • XTR-DHD: XTR decision Diffie-Hellman problem.Most protocols based on DLP can be used with XTR.
    Let T r ( g ) Tr(g) Tr(g) 为an XTR representation of an element of the XTR subgroup of F p 6 ∗ \mathbb{F}_{p^6}^* Fp6,已知 t 1 = T r ( g x ) , t 2 = T r ( g y ) , t 3 t_1=Tr(g^x),t_2=Tr(g^y),t_3 t1=Tr(gx),t2=Tr(gy),t3,判断 t 3 = T r ( g x y ) t_3=Tr(g^{xy}) t3=Tr(gxy)是否成立?

  • CL-DLP: discrete logarithms in class groups of imaginary quadratic orders。常用于key exchange。
    为standard discrete logarithm problems in a class group of imaginary quadratic orders。

  • TV-DDH: Tzeng Variant Decision Diffie-Hellman problem。常用于Conference key agreement.
    Let p , q = 2 p + 1 p,q=2p+1 p,q=2p+1均为素数,let G ⊆ F p ∗ G\subseteq \mathbb{F}_p^* GFp 为subgroup of order q q q h ∈ G h\in G hG [ 1 , p − 1 ] [1,p-1] [1,p1]内的整数, h m o d    q h\mod q hmodq [ 0 , q − 1 ] [0,q-1] [0,q1]内整数。已知 g 1 , g 2 ∈ G g_1,g_2\in G g1,g2G 0 ≤ u 1 , u 2 < q 0\leq u_1,u_2<q 0u1,u2<q,取任意整数 a a a,判断 u 1 = g 1 a m o d    q , u 2 = g 2 a m o d    q u_1=g_1^a\mod q,u_2=g_2^a\mod q u1=g1amodq,u2=g2amodq是否成立?

  • n-DHE: n-Diffie-Hellman Exponent problem。常用于 Broadcast encryption, accumulators.
    对于a group G G G of prime order q q q,let g i = g λ i , λ ← Z q g_i=g^{\lambda^i},\lambda\leftarrow \mathbb{Z}_q gi=gλi,λZq,已知 { g , g 1 , g 2 , ⋯   , g n , g n + 2 , ⋯   , g 2 n } ∈ G 2 n \{g,g_1,g_2,\cdots,g_n,g_{n+2},\cdots,g_{2n}\}\in G^{2n} {g,g1,g2,,gn,gn+2,,g2n}G2n,计算 g n + 1 。 g_{n+1}。 gn+1

2. Factoring

Factoring problems通常针对的是products of two random primes。如 n = p q , n ∈ N n=pq,n\in\mathbb{N} n=pq,nN,其中 p , q p,q p,q均为素数。
通常基于安全考虑,定义强素数的形式为 p = 2 p ′ + 1 p=2p'+1 p=2p+1,其中 p p p p ′ p' p均为素数。

  • FACTORING: integer factorisation problem
    已知正整数 n ∈ N n\in\mathbb{N} nN,寻找其素数因式分解 n = p 1 e 1 p 2 e 2 ⋯ p k e k n=p_1^{e_1}p_2^{e_2}\cdots p_k^{e_k} n=p1e1p2e2pkek,其中 p i p_i pi为pairwise distinct 素数, e i > 0 e_i>0 ei>0

  • SQRT: square roots modulo a composite
    已知复合正整数 n ∈ N n\in\mathbb{N} nN 和 a square a a a modulo n n n,求 a a a modulo n n n的平方根,即求解integer x x x 使得 x 2 ≡ a   ( m o d   n ) x^2\equiv a\ (mod\ n) x2a (mod n)
    常用于Rabin encryption。

  • C H A R A C T E R d CHARACTER^d CHARACTERd: character problem
    Let n n n d d d为正整数,已知 x ∈ Z n ∗ x\in\mathbb{Z}_n^* xZn,设计算法 χ ( x ) \chi(x) χ(x),其中 χ \chi χ为a non-trivial character of Z n ∗ \mathbb{Z}_n^* Zn of order d d d
    常用于Undeniable Signautres。
    可看成是quadratic residuosity problem的generalisation。

  • M O V A d MOVA^d MOVAd: character problem
    Let n ∈ Z , s ∈ Z + n\in\mathbb{Z},s\in\mathbb{Z}^+ nZ,sZ+ χ \chi χ为a character of order d d d on Z n ∗ \mathbb{Z}_n^* Zn。已知 s s s个pairs ( α i , χ ( α i ) ) (\alpha_i,\chi(\alpha_i)) (αi,χ(αi)),其中 α i ∈ Z n ∗ \alpha_i\in\mathbb{Z}_n^* αiZn for all i ∈ [ 1 , ⋯   , s ] i\in[1,\cdots,s] i[1,,s] x ∈ Z n ∗ x\in\mathbb{Z}_n^* xZn,计算 χ ( x ) \chi(x) χ(x)
    常用于Undeniable Signautres。

  • C Y C L O F A C T d CYCLOFACT^d CYCLOFACTd: factorisation in Z[θ]
    Let θ \theta θ d t h d^{th} dth root of unity, σ \sigma σ 为 an element of Z [ θ ] \mathbb{Z}[\theta] Z[θ],求 σ \sigma σ的因式分解。

  • F E R M A T d FERMAT^d FERMATd: factorisation in Z[θ]
    Let θ \theta θ d t h d^{th} dth root of unity, n ∈ Z n\in\mathbb{Z} nZ 使得 n = π π ˉ n=\pi\bar{\pi} n=ππˉ for some π ∈ Z [ θ ] \pi\in\mathbb{Z}[\theta] πZ[θ]。已知 n n n,求 π \pi π

  • RSAP: RSA problem
    已知正整数 n n n为至少2个素数的乘积,已知整数 e e e (coprime with φ ( n ) \varphi(n) φ(n)) 和整数 c c c,求整数 m m m使得 m e ≡ c   ( m o d   n ) m^e\equiv c\ (mod\ n) mec (mod n)成立。

  • Strong-RSAP: strong RSA problem
    已知正整数 n n n为至少2个素数的乘积,已知整数 c c c,求奇数 e ≥ 3 e\geq 3 e3和整数 m m m,使得 m e ≡ c   ( m o d   n ) m^e\equiv c\ (mod\ n) mec (mod n)成立。

  • Difference-RSAP: Difference RSA problem
    已知正整数 n n n为至少2个素数的乘积,已知an element D ∈ Z n ∗ D\in\mathbb{Z}_n^* DZn m − 1 m-1 m1 个pairs ( x i , y i ) (x_i,y_i) (xi,yi) 使得 x i e − y i e = D   ( m o d   n ) x_i^e-y_i^e=D\ (mod\ n) xieyie=D (mod n),求解新的pair x m e − y m e = D   ( m o d   n ) x_m^e-y_m^e=D\ (mod\ n) xmeyme=D (mod n) 成立。

  • Partial-DL-ZN2P: Partial Discrete Logarithm problem in Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2
    已知正整数 n = p q n=pq n=pq,其中 p = 2 p ′ + 1 , q = 2 q ′ + 1 p=2p'+1,q=2q'+1 p=2p+1,q=2q+1 p , p ′ , q , q ′ p,p',q,q' p,p,q,q均为素数,已知an element g ∈ Z n 2 ∗ g\in\mathbb{Z}_{n^2}^* gZn2 of maximal order in G = Q R n 2 G=QR_{n^2} G=QRn2 h = g a   m o d   n 2 h=g^a\ mod\ n^2 h=ga mod n2 for some a ∈ { 1 , ⋯   , o r d ( G ) } a\in\{1,\cdots,ord(G)\} a{1,,ord(G)},求解整数 x x x使得 x = a   ( m o d   n ) x=a\ (mod\ n) x=a (mod n)
    常用于homomorphic public key encryption, public key encryption with double trapdoor decryption mechanism。

  • DDH-ZN2P: Decision Diffie-Hellman problem over Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2
    已知正整数 n = p q n=pq n=pq,其中 p = 2 p ′ + 1 , q = 2 q ′ + 1 p=2p'+1,q=2q'+1 p=2p+1,q=2q+1 p , p ′ , q , q ′ p,p',q,q' p,p,q,q均为素数,已知an element g ∈ Z n 2 ∗ g\in\mathbb{Z}_{n^2}^* gZn2 of maximal order in G = Q R n 2 G=QR_{n^2} G=QRn2 和 elements X = g x   m o d   n 2 , Y = g y   m o d   n 2 X=g^x\ mod\ n^2, Y=g^y\ mod\ n^2 X=gx mod n2,Y=gy mod n2 for some x , y ∈ { 1 , ⋯   , o r d ( G ) } x,y\in\{1,\cdots,ord(G)\} x,y{1,,ord(G)} 以及 Z ∈ G Z\in G ZG,判断 Z = g x y   m o d   n 2 Z=g^{xy}\ mod\ n^2 Z=gxy mod n2是否成立。
    常用于public key encryption with double trapdoor decryption mechanism。

  • Lift-DH-ZN2P: Lift Diffie-Hellman problem over Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2
    已知正整数 n = p q n=pq n=pq,其中 p = 2 p ′ + 1 , q = 2 q ′ + 1 p=2p'+1,q=2q'+1 p=2p+1,q=2q+1 p , p ′ , q , q ′ p,p',q,q' p,p,q,q均为素数,已知an element g ∈ Z n 2 ∗ g\in\mathbb{Z}_{n^2}^* gZn2 of maximal order in G = Q R n 2 G=QR_{n^2} G=QRn2 和 elements X = g x   m o d   n 2 , Y = g y   m o d   n 2 X=g^x\ mod\ n^2, Y=g^y\ mod\ n^2 X=gx mod n2,Y=gy mod n2 for some x , y ∈ { 1 , ⋯   , o r d ( G ) } x,y\in\{1,\cdots,ord(G)\} x,y{1,,ord(G)} 以及 Z = g x y   m o d   n Z=g^{xy}\ mod\ n Z=gxy mod n,求 Z ′ = g x y   m o d   n 2 Z'=g^{xy}\ mod\ n^2 Z=gxy mod n2
    常用于public key encryption with double trapdoor decryption mechanism。

  • EPHP: Election Privacy Homomorphism problem
    已知固定的小素数 e e e、素数 p p p 使得 e ∣ ( p − 1 ) e|(p-1) e(p1)、素数 q q q使得 e ∤ ( q − 1 ) e\nmid (q-1) e(q1),有 n = p q n=pq n=pq g ∈ Z n g\in\mathbb{Z}_n gZn e e e divides the order of g g g。由 g g g作为generator生成的group表示为 G G G
    EPHP是指:已知 w ∈ G w\in G wG v ∈ [ 0 , e ] v\in [0,e] v[0,e],是否存在 r ∈ N r\in N rN,使得 w = g v + e r w=g^{v+er} w=gv+er成立。存在的概率应高于 ( e − 1 ) / e (e-1)/e (e1)/e
    常用于homomorphic public key encryption 和 electronic voting protocols。

  • AERP: Approximate e-th root problem
    已知正整数 n = p 2 q n=p^2q n=p2q,其中 p , q p,q p,q为素数且 ∣ n ∣ = 3 k |n|=3k n=3k,已知整数 e ≥ 4 e\geq 4 e4 y ∈ Z n y\in\mathbb{Z}_n yZn,求整数 x x x,使得 ( x e   m o d   n ) ∈ I k ( y ) (x^e\ mod\ n)\in I_k(y) (xe mod n)Ik(y)成立,其中 I k ( y ) = { u ∣ y ≤ u < y + 2 2 k − 1 } I_k(y)=\{u|y\leq u< y+2^{2k-1}\} Ik(y)={uyu<y+22k1}
    常用于ESIGN signature scheme。

  • l l l-HENSEL-RSAP: l l l-Hensel RSA
    已知 N = p q N=pq N=pq e e e coprime with ϕ ( N ) \phi(N) ϕ(N) x e   ( m o d   N ) x^e\ (mod\ N) xe (mod N) for a random integer 1 < x < N 1<x<N 1<x<N,求 x e   ( m o d   N l ) x^e\ (mod\ N^l) xe (mod Nl)
    常用于public-key encryption。

  • DSeRP: Decisional Small e-Residues in Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2
    已知正整数 n = p q n=pq n=pq,其中 p , q p,q p,q为素数,已知整数 e > 2 e>2 e>2 使得 g c d ( e , n ( p − 1 ) ( q − 1 ) ) = 1 gcd(e,n(p-1)(q-1))=1 gcd(e,n(p1)(q1))=1,是否能区分 D 0 = { c = r e   m o d   n 2 ∣ r ∈ R Z n } D_0=\{c=r^e\ mod\ n^2|r\in_R\mathbb{Z}_n\} D0={c=re mod n2rRZn} distribution 和 D 1 = { c ∈ R Z n 2 } D_1=\{c\in_R\mathbb{Z}_{n^2}\} D1={cRZn2} distribution。
    常用于Semantically secure public key encryption from Paillier-related assumptions。

  • DS2eRP: Decisional Small 2e-Residues in Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2
    已知正整数 n = p q n=pq n=pq,其中 p , q p,q p,q为素数, p = q = 3   m o d   4 p=q=3\ mod\ 4 p=q=3 mod 4,已知整数 e e e 使得 g c d ( e , n ( p − 1 ) ( q − 1 ) ) = 1 gcd(e,n(p-1)(q-1))=1 gcd(e,n(p1)(q1))=1 ∣ n ∣ / 2 < 3 < ∣ n ∣ |n|/2<3<|n| n/2<3<n,是否能区分 D 0 = { c = r 2 e   m o d   n 2 ∣ r ∈ R Q R n } D_0=\{c=r^{2e}\ mod\ n^2|r\in_R QR_n\} D0={c=r2e mod n2rRQRn} distribution 和 D 1 = { c ∈ R Q R n 2 } D_1=\{c\in_R QR_{n^2}\} D1={cRQRn2} distribution。
    常用于Semantically secure public key encryption mixing Paillier and Rabin functions。

  • DSmallRSAKP: Decisional Reciprocal RSA-Paillier in Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2
    已知正整数 n = p q n=pq n=pq,其中 p , q p,q p,q为素数,已知an element α \alpha α使得 ( α / p ) = ( α / q ) = − 1 (\alpha/p)=(\alpha/q)=-1 (α/p)=(α/q)=1,已知整数 e e e使得 ∣ n ∣ / 2 < e < ∣ n ∣ |n|/2<e<|n| n/2<e<n,是否能区分 D 0 = { ( n , e , α , c ) ∣ c = ( r + α r ) e   m o d   n 2 , r ∈ R Z n   s . t .   ( r / n ) = 1 , ( α / r   m o d   n ) > r } D_0=\{(n,e,\alpha,c)|c=(r+\frac{\alpha}{r})^e\ mod\ n^2,r\in_R\mathbb{Z}_n\ s.t.\ (r/n)=1, (\alpha/r\ mod\ n)>r\} D0={(n,e,α,c)c=(r+rα)e mod n2,rRZn s.t. (r/n)=1,(α/r mod n)>r} distribution 和 D 1 = { ( n , e , α , c ) ∣ c = ( r + α r ) e   m o d   n 2 , r ∈ R Z n 2 } D_1=\{(n,e,\alpha,c)|c=(r+\frac{\alpha}{r})^e\ mod\ n^2,r\in_R\mathbb{Z}_{n^2}\} D1={(n,e,α,c)c=(r+rα)e mod n2,rRZn2} distribution。
    常用于Semantically secure public key encryption from Paillier-related assumptions。

  • HRP: Higher Residuosity Problem
    已知 n n n a a a为正整数,且 a ∣ ϕ ( n ) a|\phi(n) aϕ(n),已知 x ∈ Z n ∗ x\in\mathbb{Z}_n^* xZn,判断是否存在 y y y,使得 y a = x y^a=x ya=x
    常用于:convertible group signature,public key encrytpion。

  • ECSQRT: Square roots in elliptic curve groups over Z / n Z \mathbb{Z}/n\mathbb{Z} Z/nZ
    已知 E ( Z / n Z ) E(\mathbb{Z}/n\mathbb{Z}) E(Z/nZ) 为 elliptic curve group over Z / n Z \mathbb{Z}/n\mathbb{Z} Z/nZ,已知a point Q ∈ E ( Z / n Z ) Q\in E(\mathbb{Z}/n\mathbb{Z}) QE(Z/nZ),计算所有points P ∈ E ( Z / n Z ) P\in E(\mathbb{Z}/n\mathbb{Z}) PE(Z/nZ) 使得 2 P = Q 2P=Q 2P=Q

  • RFP: Root Finding Problem
    计算多项式 f ( x ) f(x) f(x) over the ring Z n \mathbb{Z}_n Zn的所有roots,其中 n = p q n=pq n=pq p , q p,q p,q为2个大素数。

  • phiA: PHI-Assumption
    P R I M E S a PRIMES_a PRIMESa 为the set of all primes of length a a a H a H_a Ha为the set of the composite integers that are product of two primes of length a a a
    p ∣ ϕ ( m ) p|\phi(m) pϕ(m),则称composite integer m m m ϕ \phi ϕ-hides a prime p p p
    H b ( m ) H^b(m) Hb(m)表示the set of b b b-bit primes p p p that are ϕ \phi ϕ-hidden by m m m; H ˉ b ( m ) \bar{H}^b(m) Hˉb(m)表示the set P R I M E S b − H b ( m ) PRIMES_b-H^b(m) PRIMESbHb(m)
    ϕ \phi ϕ-Hidding假设:存在 e , f , g , h > 0 e,f,g,h>0 e,f,g,h>0,使得对于 ∀ k > h \forall k>h k>h ∀ 2 e k \forall 2^{ek} 2ek-gate circuits C C C P r [ m ← H k ; p 0 ← H k ( m ) ; p 1 ← H ˉ k ( m ) ; b ← 0 , 1 : C ( m , p b ) = b ] > 1 / 2 + 2 − g k Pr[m\leftarrow H^k;p_0\leftarrow H^k(m);p_1\leftarrow \bar{H}^k(m);b\leftarrow 0,1: C(m,p_b)=b]>1/2+2^{-gk} Pr[mHk;p0Hk(m);p1Hˉk(m);b0,1:C(m,pb)=b]>1/2+2gk
    ϕ \phi ϕ-Sampling假设:存在 e , f , g , h > 0 e,f,g,h>0 e,f,g,h>0,使得对于 ∀ k > h \forall k>h k>h,存在a sampling algorithm S ( ) S() S() 使得for all k k k-bit primes p p p S ( p ) S(p) S(p) 输出a random k f k^f kf-bit number m ∈ H k f k m\in H_{k^f}^k mHkfk that ϕ \phi ϕ-hides p p p together with m m m's integer factorization。

  • C-DRSA: Computational Dependent-RSA problem
    已知 ( N , e ) (N,e) (N,e) α ∈ Z n ∗ \alpha\in\mathbb{Z}_n^* αZn,求 ( a + 1 ) e ( m o d    n ) (a+1)^e(\mod n) (a+1)e(modn) 其中 α = a e ( m o d    n ) \alpha=a^e(\mod n) α=ae(modn)

  • D-DRSA: Decisional Dependent-RSA problem
    已知 ( N , e ) (N,e) (N,e) α = a e ( m o d    n ) \alpha=a^e(\mod n) α=ae(modn) γ ∈ Z n ∗ \gamma\in\mathbb{Z}_n^* γZn,是否能区分 γ = ( a + 1 ) e ( m o d    n ) \gamma=(a+1)^e(\mod n) γ=(a+1)e(modn) γ = c e ( m o d    n ) \gamma=c^e(\mod n) γ=ce(modn),其中 a , c a,c a,c Z n ∗ \mathbb{Z}_n^* Zn中的随机数。

  • E-DRSA: Extraction Dependent-RSA problem
    已知 ( N , e ) (N,e) (N,e) α = a e ( m o d    n ) \alpha=a^e(\mod n) α=ae(modn) γ = ( a + 1 ) e ( m o d    n ) \gamma=(a+1)^e(\mod n) γ=(a+1)e(modn),求 a ( m o d    n ) a(\mod n) a(modn)

  • DCR: Decisional Composite Residuosity problem
    已知composite n n n和integer z z z,判断 z z z是否为 n n n-residue modulo n 2 n^2 n2

  • CRC: Composite Residuosity Class problem
    B α ⊂ Z n 2 ∗ B_{\alpha}\subset\mathbb{Z}_{n^2}^* BαZn2 表示:the set of elements of order n α n\alpha nα
    B B B表示: B α B_{\alpha} Bα的disjoint union for α = 1 , ⋯   , λ \alpha=1,\cdots,\lambda α=1,,λ,其中 λ = λ ( n ) \lambda=\lambda(n) λ=λ(n)为the Carmichael’s function taken on n n n
    已知a composite n , w ∈ Z n 2 ∗ , g ∈ B n,w\in\mathbb{Z}_{n^2}^*, g\in B n,wZn2,gB,计算the n n n-residuosity class of w w w with respect to g : [ w ] g g:[w]_g g:[w]g

  • DCRC: Decisional Composite Residuosity Class problem
    B α ⊂ Z n 2 ∗ B_{\alpha}\subset\mathbb{Z}_{n^2}^* BαZn2 表示:the set of elements of order n α n\alpha nα
    B B B表示: B α B_{\alpha} Bα的disjoint union for α = 1 , ⋯   , λ \alpha=1,\cdots,\lambda α=1,,λ,其中 λ = λ ( n ) \lambda=\lambda(n) λ=λ(n)为the Carmichael’s function taken on n n n
    已知a composite n , w ∈ Z n 2 ∗ , g ∈ B , x ∈ Z n n,w\in\mathbb{Z}_{n^2}^*, g\in B,x\in\mathbb{Z}_n n,wZn2,gB,xZn,判断 x = [ w ] g x=[w]_g x=[w]g是否成立。

  • GenBBS: generalised Blum-Blum-Shub assumption
    已知a composite positive integer n ∈ N n\in\mathbb{N} nN 和 一系列 g , g 2 ( m o d    n ) , g 4 ( m o d    n ) , g 8 ( m o d    n ) , ⋯   , g 2 2 k ( m o d    n ) g,g^2(\mod n), g^4(\mod n), g^8(\mod n),\cdots,g^{2^{2^{k}}}(\mod n) g,g2(modn),g4(modn),g8(modn),,g22k(modn),是否能区分 g 2 2 k + 1 ( m o d    n ) g^{2^{2^{k+1}}}(\mod n) g22k+1(modn) r 2 ( m o d    n ) r^2(\mod n) r2(modn)

3. Product groups

本节主要关注的是products of two groups of known prime order,常用于pairing based cryptography,但是在本节讨论的是 pairing之外的安全假设。
主要有3种分类:
1)Type 1: G 1 = G 2 G_1=G_2 G1=G2,均为group of prime order q q q
2)Type 2: G 1 ≠ G 2 G_1\neq G_2 G1=G2,均为group of prime order q q q,但是存在efficiently computable homomorphism ψ : G 2 → G 1 \psi:G_2\rightarrow G_1 ψ:G2G1
3)Type3: G 1 ≠ G 2 G_1\neq G_2 G1=G2,均为group of prime order q q q,且不存在efficiently computable homomorphism ψ : G 2 → G 1 \psi:G_2\rightarrow G_1 ψ:G2G1

g i g_i gi表示a generator of G i G_i Gi,则对于Type 1有 g 1 = g 2 g_1=g_2 g1=g2
对于 a ∈ G i , b ∈ G j a\in G_i,b\in G_j aGi,bGj,若 log ⁡ g i a = log ⁡ g j b \log_{g_i}a=\log_{g_j}b loggia=loggjb,则表示为 a ∼ b a\sim b ab

  • co-CDH: co-Computational Diffie-Hellman Problem
    已知 g i a g_i^a gia,求 g 3 − i a g_{3-i}^a g3ia

  • PG-CDH: Computational Diffie-Hellman Problem for Product Groups
    已知 g i , g i x , g i y , g 3 − i , g 3 − i x , g 3 − i y g_i,g_i^x,g_i^y,g_{3-i},g_{3-i}^x,g_{3-i}^y gi,gix,giy,g3i,g3ix,g3iy,求 g i x y g_i^{xy} gixy

  • XDDH: External Decision Diffie-Hellman Problem
    已知 g i a , g j b g_i^a,g_j^b gia,gjb v ∈ G k v\in G_k vGk,判断 v = g k a b v=g_k^{ab} v=gkab是否成立。

  • D-Linear2: Decision Linear Problem (version 2)
    已知 g ∈ G 1 , g a , g b , g a c , g b d g\in G_1,g^a,g^b,g^{ac},g^{bd} gG1,ga,gb,gac,gbd g 2 ∈ G 2 , g 2 a , g 2 b , v ∈ G 1 g_2\in G_2,g_2^a,g_2^b,v\in G_1 g2G2,g2a,g2b,vG1,判断 v = g c + d v=g^{c+d} v=gc+d是否成立。

  • PG-DLIN: Decision Linear Problem for Product Groups
    已知 g i 1 , g i 2 , g i 3 ∈ G i , g i 1 x , g i 2 y g_{i1},g_{i2},g_{i3}\in G_i, g_{i1}^x,g_{i2}^y gi1,gi2,gi3Gi,gi1x,gi2y g j 1 , g j 2 , g j 3 ∈ G j , g k 1 x , g k 2 x g_{j1},g_{j2},g_{j3}\in G_j, g_{k1}^x,g_{k2}^x gj1,gj2,gj3Gj,gk1x,gk2x,使得 g i 1 ∼ g j 1 , g i 2 ∼ g j 2 , g i 3 ∼ g j 3 g_{i1}\sim g_{j1},g_{i2}\sim g_{j2}, g_{i3}\sim g_{j3} gi1gj1,gi2gj2,gi3gj3,判断 v = g l 1 x + y v=g_{l1}^{x+y} v=gl1x+y是否成立。

  • FSDH: Flexible Square Diffie-Hellman Problem
    已知 g 2 a ∈ G 2 g_2^a\in G_2 g2aG2,对于任意选择的 h ∈ G 1 h\in G_1 hG1,求 ( h , h a , h a 2 ) (h,h^a,h^{a^2}) (h,ha,ha2)

  • KSW1: Assumption 1 of Katz-Sahai-Waters
    对于所有的p.p.t. adversaray A A A,security parameter 为 n n n的情况下,以下情况成立的概率可忽略:
    运行 G ( 1 n ) G(1^n) G(1n) 获取 ( p , q , r , G , G T , t ^ ) (p,q,r,G,G_T,\hat{t}) (p,q,r,G,GT,t^)
    设置 N = p q r N=pqr N=pqr,并令 g p , g q , g r g_p,g_q,g_r gp,gq,gr分别为generators of G p , G q , G r G_p,G_q,G_r Gp,Gq,Gr
    选择随机的 Q 1 , Q 2 , Q 3 ∈ G q Q_1,Q_2,Q_3\in G_q Q1,Q2,Q3Gq,随机的 R 1 , R 2 , R 3 ∈ G r R_1,R_2,R_3\in G_r R1,R2,R3Gr,随机的 a , b , s ∈ Z p a,b,s\in \mathbb{Z}_p a,b,sZp以及随机的bit v v v.
    A A A 已知 ( N , G , G T , t ^ ) (N,G,G_T,\hat{t}) (N,G,GT,t^) g p , g r , g q R 1 , g p b , g p b 2 , g p a g q , g p a b Q 1 , g p s , g p b s Q + 2 R 2 g_p,g_r,g_qR_1,g_p^b,g_p^{b^2},g_p^ag_q,g_p^{ab}Q_1,g_p^s,g_p^{bs}Q+2R_2 gp,gr,gqR1,gpb,gpb2,gpagq,gpabQ1,gps,gpbsQ+2R2,若 v = 0 v=0 v=0,则告知 A A A T = g p b 2 s Q 3 R 3 T=g_p^{b^2s}Q_3R_3 T=gpb2sQ3R3值。
    A A A输出 v ′ v' v使得 v ′ = v v'=v v=v的概率可忽略。

4. Pairings

2008年《Pairings for cryptographers》中指出,pairings over groups of known prime order 表示为:
t ^ : G 1 × G 2 → G T \hat{t}:G_1\times G_2\rightarrow G_T t^:G1×G2GT
若其中 G 1 , G 2 , G T G_1,G_2,G_T G1,G2,GT都具有相同的prime order l l l,则可分为以下三大类:
1)Type 1: G 1 = G 2 G_1=G_2 G1=G2;【通常使用supersingular curves,这些supersingular curves又分为两类:一类是over fields of characteristic 2 or 3 (with embedding degree 4 or 6 respectively);另一类是over fields of large prime characteristic (with embedding degree 2)。】
2)Type 2: G 1 ≠ G 2 G_1\neq G_2 G1=G2,但是存在efficiently computable homomorphism ϕ : G 2 → G 1 \phi:G_2\rightarrow G_1 ϕ:G2G1;【通常使用ordinary curves,且the homomorphism from G 2 G_2 G2 to G 1 G_1 G1 is the trace map。】
3)Type3: G 1 ≠ G 2 G_1\neq G_2 G1=G2,且不存在efficiently computable homomorphism ϕ : G 2 → G 1 \phi:G_2\rightarrow G_1 ϕ:G2G1。【通常使用ordinary curves,且 G 2 G_2 G2为the kernel of the trace map。】

G 2 G_2 G2 为non-cyclic group of order l 2 l^2 l2,则可称为Type 4。

在这里插入图片描述
在这里插入图片描述
在这里插入图片描述
在这里插入图片描述

具体举例为:

  • Type 1:
    在这里插入图片描述
  • Type 2:
    在这里插入图片描述
  • Type 3:
    在这里插入图片描述

log ⁡ g 1 a = log ⁡ g 2 b \log_{g_1}a=\log_{g_2}b logg1a=logg2b,则表示为 a ∼ b a\sim b ab
Pairing 相关假设有:【注意,有的assumption并不适于所有的pairing type。Certain assumptions are provably false w.r.t. certain group types.】

  • BDHP: Bilinear Diffie-Hellman Problem。
    已知 g i a , g j b 和 g k c g_i^a,g_j^b和g_k^c gia,gjbgkc,计算 t ^ ( g 1 , g 2 ) a b c \hat{t}(g_1,g_2)^{abc} t^(g1,g2)abc
    其中 i , j , k ∈ { 1 , 2 } i,j,k\in\{1,2\} i,j,k{1,2},对应有四种可能的组合 ( i , j , k ) ∈ { ( 1 , 1 , 1 ) , ( 1 , 1 , 2 ) , ( 1 , 2 , 2 ) , ( 2 , 2 , 2 ) } (i,j,k)\in\{(1,1,1),(1,1,2),(1,2,2),(2,2,2)\} (i,j,k){(1,1,1),(1,1,2),(1,2,2),(2,2,2)},也可称为 B D H P i , j , k BDHP_{i,j,k} BDHPi,j,k
    – 对于Type 1 pairing,以上四种组合是等价的。
    – 对于Type 2 pairing,具有 B D H P 2 , 2 , 2 ≤ P B D H P 1 , 2 , 2 ≤ P B D H P 1 , 1 , 2 ≤ P B D H P 1 , 1 , 1 BDHP_{2,2,2}\leq_P BDHP_{1,2,2}\leq_P BDHP_{1,1,2}\leq_P BDHP_{1,1,1} BDHP2,2,2PBDHP1,2,2PBDHP1,1,2PBDHP1,1,1
    – 对于Type 3 pairing,这四种组合have no known reductions between them。

  • DBDH: Decision Bilinear Diffie-Hellman Problem。常用于 Boneh-Franklin ID-based encryption scheme。
    已知 g i a , g j b , g k c 和 t ^ ( g 1 , g 2 ) z g_i^a,g_j^b,g_k^c和\hat{t}(g_1,g_2)^{z} gia,gjb,gkct^(g1,g2)z,判断 t ^ ( g 1 , g 2 ) a b c = t ^ ( g 1 , g 2 ) z \hat{t}(g_1,g_2)^{abc}=\hat{t}(g_1,g_2)^{z} t^(g1,g2)abc=t^(g1,g2)z是否成立。

  • B-DLIN: Bilinear Decision-Linear Problem
    在这里插入图片描述

  • l-BDHI: l-Bilinear Diffie-Hellman Inversion Problem
    已知 g i a , g i a 2 , g i a 3 , ⋯   , g i a l g_i^{a},g_i^{a^2},g_i^{a^3},\cdots,g_i^{a^l} gia,gia2,gia3,,gial,计算 t ^ ( g 1 , g 2 ) 1 / a \hat{t}(g_1,g_2)^{1/a} t^(g1,g2)1/a。其中 i ∈ { 1 , 2 } i\in\{1,2\} i{1,2}

  • l-DBDHI: l-Bilinear Decision Diffie-Hellman Inversion Problem
    已知 g i a , g i a 2 , g i a 3 , ⋯   , g i a l g_i^{a},g_i^{a^2},g_i^{a^3},\cdots,g_i^{a^l} gia,gia2,gia3,,gial v ∈ G T v\in G_T vGT,判断 v = t ^ ( g 1 , g 2 ) 1 / a v=\hat{t}(g_1,g_2)^{1/a} v=t^(g1,g2)1/a是否成立?其中 i ∈ { 1 , 2 } i\in\{1,2\} i{1,2}

  • l-wBDHI: l-weak Bilinear Diffie-Hellman Inversion Problem。
    已知 g i a , g i a 2 , g i a 3 , ⋯   , g i a l g_i^{a},g_i^{a^2},g_i^{a^3},\cdots,g_i^{a^l} gia,gia2,gia3,,gial g j b g_j^b gjb,计算 t ^ ( g 1 , g 2 ) a l + 1 b \hat{t}(g_1,g_2)^{a^{l+1}b} t^(g1,g2)al+1b。其中 i ∈ { 1 , 2 } i\in\{1,2\} i{1,2}

  • l-wDBDHI: l-weak Decisional Bilinear Diffie-Hellman Inversion Problem
    已知 g i a , g i a 2 , g i a 3 , ⋯   , g i a l , g j b g_i^{a},g_i^{a^2},g_i^{a^3},\cdots,g_i^{a^l},g_j^b gia,gia2,gia3,,gial,gjb v ∈ G T v\in G_T vGT,判断 v = t ^ ( g 1 , g 2 ) a l + 1 b v=\hat{t}(g_1,g_2)^{a^{l+1}b} v=t^(g1,g2)al+1b是否成立?其中 i ∈ { 1 , 2 } i\in\{1,2\} i{1,2}

  • KSW2: Assumption 2 of Katz-Sahai-Waters。首次用于 the construction of a predicate encryption scheme supporting the inner product。(KATZ等人2008年论文《Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products》)
    – 运行 G ( 1 n ) G(1^n) G(1n)来获取 ( p , q , r , G , G T , t ^ ) (p,q,r,G,G_T,\hat{t}) (p,q,r,G,GT,t^)
    – 设置 N = p q r N=pqr N=pqr,let g p , g q , g r g_p,g_q,g_r gp,gq,gr分别为 G p , G q , G r G_p,G_q,G_r Gp,Gq,Gr的generators;
    – 选择随机数 h ∈ G p ; Q 1 , Q 2 ∈ G q ; s , γ ∈ Z q h\in G_p;Q_1,Q_2\in G_q;s,\gamma\in\mathbb{Z}_q hGp;Q1,Q2Gq;s,γZq以及random bit v v v
    – p.p.t. adversary A A A 的输入有 ( N , G , G T , t ^ ) (N,G,G_T,\hat{t}) (N,G,GT,t^) g p , g q , g r , h , g p s , h s Q 1 , g p γ Q 2 , t ^ ( g p , h ) γ g_p,g_q,g_r,h,g_p^s,h^sQ_1,g_p^{\gamma}Q_2,\hat{t}(g_p,h)^{\gamma} gp,gq,gr,h,gps,hsQ1,gpγQ2,t^(gp,h)γ,当 v = 0 v=0 v=0时,再给 A A A 输入 t ^ ( g p , h ) γ s \hat{t}(g_p,h)^{\gamma s} t^(gp,h)γs;当 v = 1 v=1 v=1时,给 A A A的输入为a random element of G T G_T GT A A A的输出为a bit v ′ v' v,且其succeed if v ′ = v v'=v v=v

  • MSEDH: Multi-sequence of Exponents Diffie-Hellman Assumption。用于 Delerabl´ee and Pointcheval dynamic threshold public-key encryption scheme。
    – Let B = ( p , G 1 , G 2 , G T , t ^ ( ⋅ , ⋅ ) ) B=(p,G_1,G_2,G_T,\hat{t}(\cdot,\cdot)) B=(p,G1,G2,GT,t^(,))为a bilinear map group system,let l , m , t l,m,t l,m,t为3个整数,let g 0 g_0 g0 G 1 G_1 G1的generator, h 0 h_0 h0 G 2 G_2 G2的generator。
    – 输入为2个random coprime polynomials f f f g g g,分别具有degree l l l m m m,分别具有pairwise distinct roots x 1 , ⋯   , x l x_1,\cdots,x_l x1,,xl y 1 , ⋯   , y m y_1,\cdots,y_m y1,,ym。同时有 T ∈ G T T\in G_T TGT以及如下的exponentiations 序列:
    在这里插入图片描述
    判断 T T T是否与 t ^ ( g 0 , h 0 ) k ⋅ f ( γ ) \hat{t}(g_0,h_0)^{k\cdot f(\gamma)} t^(g0,h0)kf(γ)相等或者与 G T G_T GT中的某随机元素相同?

  • SXDH assumption: the SXDH assumption states that there are prime-order groups ( G 1 , G 2 , G T ) (G_1, G_2, G_T ) (G1,G2,GT) that admits a bilinear map e : G 1 × G 2 → G T e : G_1 \times G_2 \rightarrow G_T e:G1×G2GT such that the Decisional Diffie-Hellman (DDH) assumption holds in both G 1 G_1 G1 and G 2 G_2 G2. 首次在2005年论文《Correlation-Resistant Storage via Keyword-Searchable Encryption》中提出:在这里插入图片描述
    在这里插入图片描述
    而在 2019年论文《Proofs for Inner Pairing Products and Applications》中指出,SXDH assumption仅在Type 3 pairings 下成立,因此任何基于SXDH assumption的设计均对应应采用Type 3 pairing。

  • DBP: double pairing assumption。在2016年论文《Structure-Preserving Signatures and Commitments to Group Elements》中提出。
    在这里插入图片描述

5. Lattices

基础可参看博客 如何保护今日加密数据以抵抗量子攻击?
A lattice Λ \Lambda Λ of dimension n n n 为 a discrete subgroup of R d \mathbb{R}^d Rd,其中 d ≥ n d\geq n dn
密码学中的实际应用,通常使用的为lattices in Z d \mathbb{Z}^d Zd
A lattice is specified by a d × n d\times n d×n basis matrix B B B, consisting of n n n linearly indepedent basis vectors b ⃗ i ∈ R d \vec{b}_i\in\mathbb{R}^d b iRd
Λ ( B ) \Lambda(B) Λ(B)来表示the lattice spanned by the basis B B B

5.1 Main Lattice Problems

  • SVP γ p _{\gamma}^p γp: (Approximate) Shortest vector problem
    已知a basis B ∈ Z m × n B\in\mathbb{Z}^{m\times n} BZm×n γ > 0 \gamma>0 γ>0,求 a nonzero lattice vector v ∈ B Z n ∖ { 0 } v\in B\mathbb{Z}^n\setminus \{0\} vBZn{0},使得 ∥ v ∥ p ≤ γ λ 1 p ( B ) \parallel v\parallel _p\leq \gamma\lambda_1^p(B) vpγλ1p(B)

  • CVP γ p _{\gamma}^p γp: (Approximate) Closest vector problem
    已知a basis B ∈ Z m × n B\in\mathbb{Z}^{m\times n} BZm×n γ > 0 \gamma>0 γ>0 t ∈ B R n t\in B\mathbb{R}^n tBRn,求 a nonzero lattice vector v ∈ B Z n v\in B\mathbb{Z}^n vBZn,使得 ∥ t − v ∥ p ≤ γ λ 1 p ( B ) \parallel t-v\parallel _p\leq \gamma\lambda_1^p(B) tvpγλ1p(B)

  • GapSVP γ p _{\gamma}^p γp: Decisional shortest vector problem
    已知a basis B ∈ Z m × n B\in\mathbb{Z}^{m\times n} BZm×n d , γ > 0 d,\gamma>0 d,γ>0 和 lattice vector v ∈ B Z n ∖ { 0 } v\in B\mathbb{Z}^n\setminus \{0\} vBZn{0},是否能区分 m i n { ∥ v ∥ p : v ∈ B Z n ∖ { 0 } } ≤ d min\{\parallel v\parallel _p:v\in B\mathbb{Z}^n\setminus \{0\}\}\leq d min{vp:vBZn{0}}d m i n { ∥ v ∥ p : v ∈ B Z n ∖ { 0 } } > γ d min\{\parallel v\parallel _p:v\in B\mathbb{Z}^n\setminus \{0\}\}> \gamma d min{vp:vBZn{0}}>γd

  • GapCVP γ p _{\gamma}^p γp: Decisional closest vector problem
    已知a basis B ∈ Z m × n B\in\mathbb{Z}^{m\times n} BZm×n d , γ > 0 d,\gamma>0 d,γ>0 和 lattice vector t ∈ B R n t\in B\mathbb{R}^n tBRn,是否能区分 m i n { ∥ t − v ∥ p : v ∈ B Z n } ≤ d min\{\parallel t-v\parallel _p:v\in B\mathbb{Z}^n\}\leq d min{tvp:vBZn}d m i n { ∥ t − v ∥ p : v ∈ B Z n } > γ d min\{\parallel t-v\parallel _p:v\in B\mathbb{Z}^n\}> \gamma d min{tvp:vBZn}>γd

5.2 Modular Lattice Problems

Modular lattice problems are typically defined as average-case problems.

  • SIS p ( n , m , q , β ) ^p(n,m,q,\beta) p(n,m,q,β): Short integer solution problem
    q q q为prime, A ∈ Z q n × m A\in\mathbb{Z}_q^{n\times m} AZqn×m,其中 A A A为chosen from a distribution negligibly close to uniform over Z q n × m \mathbb{Z}_q^{n\times m} Zqn×m,则 Λ q ⊥ ( A ) = { x ⃗ ∈ Z m : A x ⃗ ≡ 0 ⃗ ( m o d    q ) } \Lambda_q^{\perp}(A)=\{\vec{x}\in\mathbb{Z}^m:A\vec{x}\equiv \vec{0}(\mod q)\} Λq(A)={x Zm:Ax 0 (modq)} 为a m m m-dimensional lattice。
    求 a vector v ⃗ ∈ Λ q ⊥ ( A ) \vec{v}\in\Lambda_q^{\perp}(A) v Λq(A) 使得 ∥ v ⃗ ∥ ≤ β \parallel \vec{v} \parallel\leq \beta v β

  • ISIS p ( n , m , q , β ) ^p(n,m,q,\beta) p(n,m,q,β): Inhomogeneous short integer solution problem
    q q q为prime, A ∈ Z q n × m A\in\mathbb{Z}_q^{n\times m} AZqn×m y ⃗ ∈ Z n \vec{y}\in\mathbb{Z}^n y Zn,其中 A A A y ⃗ \vec{y} y 为chosen from a distribution negligibly close to uniform over Z q n × m \mathbb{Z}_q^{n\times m} Zqn×m Z q n \mathbb{Z}_q^{n} Zqn
    求 a vector v ⃗ ∈ { x ⃗ ∈ Z m : A x ⃗ ≡ y ⃗ ( m o d    q ) } \vec{v}\in\{\vec{x}\in\mathbb{Z}^m:A\vec{x}\equiv \vec{y}(\mod q)\} v {x Zm:Ax y (modq)} 使得 ∥ v ⃗ ∥ ≤ β \parallel \vec{v} \parallel\leq \beta v β

  • LWE ( n , q , ϕ ) (n,q,\phi) (n,q,ϕ): Learning with errors problem
    T = R / Z \mathbb{T}=\mathbb{R}/\mathbb{Z} T=R/Z 表示 the additive group on the reals modulo one。
    A s , ϕ A_{s,\phi} As,ϕ 表示 the distribution on Z q n × T \mathbb{Z}_q^n\times \mathbb{T} Zqn×T obtained by choosing a vector a ⃗ ∈ Z q n \vec{a}\in\mathbb{Z}_q^n a Zqn uniformly at random,choosing e e e according to a probability distribution ϕ \phi ϕ on T \mathbb{T} T,输出 ( a ⃗ , < a ⃗ , s > / q + e ) (\vec{a},<\vec{a},s>/q+e) (a ,<a ,s>/q+e) for some fixed vector s ⃗ ∈ Z q n \vec{s}\in\mathbb{Z}_q^n s Zqn
    The search verion of the learning with errors problem “LWE ( n , q , ϕ ) (n,q,\phi) (n,q,ϕ)” 为:
    求the secret s ∈ Z q n s\in\mathbb{Z}_q^n sZqn,given access to polynomially many samples of choice from A s , ϕ A_{s,\phi} As,ϕ
    The decision version为:是否能区分the probability distribution A s , ϕ A_{s,\phi} As,ϕ from the unifrom random distribution。

5.3 Miscellaneous Lattice Problems

  • USVP p ( n , γ ) ^p(n,\gamma) p(n,γ): Approximate unique shortest vector problem
    Λ \Lambda Λ为an n n n-dimensional lattice,求 v ⃗ ∈ Λ ∖ { 0 ⃗ } \vec{v}\in \Lambda\setminus\{\vec{0}\} v Λ{0 },使得 ∥ p ⃗ ∥ ≤ γ λ 1 ( p ) ( Λ ) \parallel\vec{p}\parallel\leq \gamma\lambda_1^{(p)}(\Lambda) p γλ1(p)(Λ),其中 λ 1 ( p ) ( Λ ) \lambda_1^{(p)}(\Lambda) λ1(p)(Λ)为the first successive minimum of Λ \Lambda Λ in the p p p-norm and the shortest lattice vector i ⃗ \vec{i} i is γ \gamma γ-unique。
    换句话说,for all w ⃗ ∈ Λ \vec{w}\in\Lambda w Λ with λ 1 ( p ) ≤ ∥ w ⃗ ∥ ≤ γ λ 1 ( p ) ( Λ ) \lambda_1^{(p)}\leq \parallel \vec{w}\parallel\leq \gamma\lambda_1^{(p)}(\Lambda) λ1(p)w γλ1(p)(Λ),有 w ⃗ = z u ⃗ \vec{w}=z\vec{u} w =zu for some z ∈ Z z\in\mathbb{Z} zZ

  • SBP p ( n , γ ) ^p(n,\gamma) p(n,γ): Approximate shortest basis problem
    Λ ⊆ R d \Lambda\subseteq\mathbb{R}^d ΛRd n n n-dimensional lattice,求a basis B B B of Λ \Lambda Λ 使得 for all B ′ ∈ { B ∈ Q d × n : Λ = Λ ( B ) }   m a x i = 1 n { ∥ b ⃗ i ∥ } ≤ γ m a x i = 1 n { ∥ b ⃗ i ′ ∥ p } B'\in\{B\in\mathbb{Q}^{d\times n}:\Lambda=\Lambda(B)\}\ max_{i=1}^n\{\parallel\vec{b}_i\parallel\}\leq\gamma max_{i=1}^n\{\parallel \vec{b}_i'\parallel_p\} B{BQd×n:Λ=Λ(B)} maxi=1n{b i}γmaxi=1n{b ip}

  • SLP p ( n , γ ) ^p(n,\gamma) p(n,γ): Approximate shortest length problem
    Λ ⊆ R d \Lambda\subseteq\mathbb{R}^d ΛRd n n n-dimensional lattice,求the approximate length (w.r.t the p p p-norm) λ ( p ) \lambda^{(p)} λ(p) of the shortest vector v ⃗ ∈ Λ ∖ { 0 ⃗ } \vec{v}\in\Lambda\setminus\{\vec{0}\} v Λ{0 } 使得 λ 1 ( p ) ( Λ ) ≤ λ ( p ) ≤ γ λ 1 ( p ) ( Λ ) \lambda_1^{(p)}(\Lambda)\leq\lambda^{(p)}\leq \gamma\lambda_1^{(p)}(\Lambda) λ1(p)(Λ)λ(p)γλ1(p)(Λ),其中 λ 1 ( p ) \lambda_1^{(p)} λ1(p) 表示 the first successive minimum of Λ \Lambda Λi n the p p p-norm。

  • SIVP p ( n , γ ) ^p(n,\gamma) p(n,γ): Approximate shortest independent vector problem
    Λ ⊆ R d \Lambda\subseteq\mathbb{R}^d ΛRd n n n-dimensional lattice,求 linearly indepedent vectors v ⃗ 1 , ⋯   , v ⃗ n ∈ Λ \vec{v}_1,\cdots,\vec{v}_n\in\Lambda v 1,,v nΛ with m a x i = 1 n ∥ v ⃗ i ∥ ≤ γ λ n ( p ) ( Λ ) max_{i=1}^{n}\parallel \vec{v}_i\parallel\leq\gamma\lambda_n^{(p)}(\Lambda) maxi=1nv iγλn(p)(Λ),其中 λ n ( p ) ( Λ ) \lambda_n^{(p)}(\Lambda) λn(p)(Λ) 为the n n n-th successive minimum of Λ \Lambda Λi n the p p p-norm。

  • hermiteSVP: Hermite shortest vector problem
    已知a basis matrix B ∈ Z m × n ( m ≥ n ) B\in \mathbb{Z}^{m\times n}(m\geq n) BZm×n(mn) γ ≥ 1 \gamma\geq 1 γ1,求a nonzero vector v v v of norm ∥ v ∥ ≤ γ d e t ( L ( B ) ) 1 / n \parallel v\parallel\leq \gamma det(L(B))^{1/n} vγdet(L(B))1/n

  • CRP: Covering radius problem
    已知an approximation factor γ ≥ 1 \gamma\geq 1 γ1,the input to CRP is a pair ( B , r ) (B,r) (B,r),其中 B B B为a basis matrix B ∈ Z m × n B\in\mathbb{Z}^{m\times n} BZm×n 以及 r ∈ R r\in\mathbb{R} rR。是否能区分 ρ ( L ( B ) ) ≤ r \rho(L(B))\leq r ρ(L(B))r ρ ( L ( B ) ) > γ ⋅ r \rho(L(B))>\gamma\cdot r ρ(L(B))>γr

5.4 Ideal Lattice Problems

R = Z [ x ] / < f > R=\mathbb{Z}[x]/<f> R=Z[x]/<f>为the ring of integer polynomials modulo some monic polynomial f f f of degree n n n
由于 R R R为isomorphic to Z n \mathbb{Z}^n Zn as an additive group,且 ideals in R R R 为 by definition subgroups,两者都对应为lattices。这种形式的latttice称为 “ideal lattices” with respect to f f f

  • Ideal-SVP γ f , p _\gamma^{f,p} γf,p: (Approximate) Ideal shortest vector problem / Shortest polynomial problem
    已知an ideal I I I in Z [ x ] / < f > \mathbb{Z}[x]/<f> Z[x]/<f>,求a polynomial g ∈ I ∖ { 0 } g\in I\setminus\{0\} gI{0},使得 ∥ g m o d    f ∥ p ≤ γ λ 1 p ( I ) \parallel g\mod f\parallel_p\leq \gamma\lambda_1^p(I) gmodfpγλ1p(I)

  • Ideal-SIS q , m , β f , p _{q,m,\beta}^{f,p} q,m,βf,p: Ideal small integer solution problem
    已知 n n n g 1 , ⋯   , g m g_1,\cdots,g_m g1,,gm chosen uniformly at random from Z q [ x ] / < f > \mathbb{Z}_q[x]/<f> Zq[x]/<f>,求 e 1 , ⋯   , e m e_1,\cdots,e_m e1,,em in Z [ x ] \mathbb{Z}[x] Z[x],使得 ∑ i ≤ m e i g i = 0 ( m o d    q ) \sum_{i\leq m}e_ig_i=0(\mod q) imeigi=0(modq) ∥ e ∥ p ≤ β \parallel e\parallel _p\leq \beta epβ,其中 e e e is obtained by concatenating the coefficients of all e i e_i ei's。

6. Miscellaneous Problems

  • KEA1: Knowledge of Exponent assumption。参见2004年论文《The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols》:
    背景知识为:Let q q q be a prime such that 2 q + 1 2q+1 2q+1 is also prime, and let g g g be a generator of the order q q q subgroup of Z 2 q + 1 ∗ Z_{2q+1}^* Z2q+1。假设输入有 q , g , g a q,g,g^a q,g,ga,想要输出a pair ( C , Y ) , Y = C a (C,Y), Y=C^a (C,Y),Y=Ca。可实现的方式之一是pick some c ∈ Z q c\in\mathbb{Z}_q cZq,设置 C = g c C=g^c C=gc,则有 Y = ( g a ) c = C a Y=(g^a)^c=C^a Y=(ga)c=Ca成立。直观上来说,KEA1假设是指这是唯一的方式。对于任意的adversary能输出such a pair的,其肯定知道相应的 c c c值使得 g c = C g^c=C gc=C。在以下的正式定义中引入了extractor可返回相应的 c c c值:
    KEA1 (Knowledge of Exponent assumption) 的定义为: For any adversary A A A that takes input q , g , g a q,g,g^a q,g,ga,返回 ( C , Y ) (C,Y) (C,Y)其中 Y = C a Y=C^a Y=Ca,即意味着存在an extractor A A A,对于与adversary相同的输入,可返回 c c c值,使得 g c = C g^c=C gc=C

  • MQ: Multivariable Quadratic equations。多变量二次方程式。
    已知a system of m m m quadratic polynomial equations in n n n variables each, { y 1 = p 1 ( x 1 , ⋯   , x n ) , ⋯   , y m = p m ( x 1 , ⋯   , x n ) } \{y_1=p_1(x_1,\cdots,x_n),\cdots,y_m=p_m(x_1,\cdots,x_n)\} {y1=p1(x1,,xn),,ym=pm(x1,,xn)},求解 x ∈ F n x\in\mathbb{F}^n xFn 为 in general an NP-problem。

  • CF: Given-weight codeword finding。常用于: McEliece public key cryptosystem (finding the shortest codeword).
    已知 n × k n\times k n×k binary linear code C C C和相应的 n × ( n − k ) n\times (n-k) n×(nk) parity check matrix H H H,求解vector x ⃗ \vec{x} x 使得 x ⃗ H = 0 \vec{x}H=0 x H=0成立且 x x x has weight w w w

  • ConjSP: Braid group conjugacy search problem。
    已知 x , y ∈ B n x,y\in B_n x,yBn,求解 a ∈ B n a\in B_n aBn使得 a − 1 x a = y a^{-1}xa=y a1xa=y成立。

  • GenConjSP: Generalised braid group conjugacy search problem。用于 Public-key cryptosystem due to Ko, Lee, Cheon, Han, Kang and Park。
    已知 x , y ∈ B n x,y\in B_n x,yBn,求解 a ∈ B m , m ≤ n a\in B_m,m\leq n aBm,mn使得 a − 1 x a = y a^{-1}xa=y a1xa=y成立。

  • ConjDecomP: Braid group conjugacy decomposition problem。
    已知 x , y ∈ B n x,y\in B_n x,yBn y = b x b − 1 y=bxb^{-1} y=bxb1 for some b ∈ B n b\in B_n bBn,求解 a ′ , a ′ ′ ∈ B m , m < n a',a''\in B_m,m<n a,aBm,m<n使得 a ′ x a ′ ′ = y a'xa''=y axa=y成立。

  • ConjDP: Braid group conjugacy decision problem。
    已知 x , y ∈ B n x,y\in B_n x,yBn,判断 x x x y y y是否conjugate?即是否存在 a ∈ B n a\in B_n aBn使得 a − 1 x a = y a^{-1}xa=y a1xa=y成立?

  • DHCP: Braid group decisional Diffie-Hellman-type conjugacy problem。常用于 Public-key cryptosystem, pseudorandom number generator, pseudorandom synthesizer。
    已知 a , w l − 1 a w l , w u − 1 a w u a,w_l^{-1}aw_l,w_u^{-1}aw_u a,wl1awl,wu1awu,判断 x u − 1 x l − 1 a x l x u = w u − 1 w l − 1 a w l w u x_u^{-1}x_l^{-1}ax_lx_u=w_u^{-1}w_l^{-1}aw_lw_u xu1xl1axlxu=wu1wl1awlwu是否成立?for a ∈ B n , x l , w l ∈ B l a\in B_n,x_l,w_l\in B_l aBn,xl,wlBl and x u , w u ∈ B u x_u,w_u\in B_u xu,wuBu

  • ConjSearch: (multiple simlutaneous) Braid group conjugacy search problem。
    Let B B B be a braid group, g ˉ = ( g 1 , ⋯   , g k ) \bar{g}=(g_1,\cdots,g_k) gˉ=(g1,,gk) and h ˉ = ( h 1 , ⋯   , h k ) \bar{h}=(h_1,\cdots,h_k) hˉ=(h1,,hk) be two tuples of elements of B B B。查找 x ∈ B x\in B xB使得 h ˉ = x − 1 g ˉ x \bar{h}=x^{-1}\bar{g}x hˉ=x1gˉx成立。

  • SubConjSearch: subgroup restricted Braid group conjugacy search problem。常用于Anshel- Anshel- Goldfeld key exchange protocol (AAG)。
    Let B B B be a braid group, and A A A a subgroup of B B B generated by some { a 1 , ⋯   , a r } \{a_1,\cdots,a_r\} {a1,,ar} and let g ˉ = ( g 1 , ⋯   , g k ) \bar{g}=(g_1,\cdots,g_k) gˉ=(g1,,gk) and h ˉ = ( h 1 , ⋯   , h k ) \bar{h}=(h_1,\cdots,h_k) hˉ=(h1,,hk) be two tuples of elements of B B B。查找 x ∈ A x\in A xA, as a word in { a 1 , ⋯   , a r } \{a_1,\cdots,a_r\} {a1,,ar},使得 h ˉ = x − 1 g ˉ x \bar{h}=x^{-1}\bar{g}x hˉ=x1gˉx成立。

  • LINPOLY : A linear algebra problem on polynomials。
    Let W W W be a linear space of dimension ≤ n \leq n n consisting of quadratic forms in n n n variables X 1 , ⋯   , X n X_1,\cdots,X_n X1,,Xn。已知 V = ∑ 1 ≤ i ≤ n X i W V=\sum_{1\leq i\leq n}X_iW V=1inXiW,is it possible (and how) to uniquely determine W W W? For any subspace L ′ L' L of the linear space L L L generated by X 1 , ⋯   , X n X_1,\cdots,X_n X1,,Xn。Let ( V : L ′ ) ← r ∈ K [ X 1 , ⋯   , X n ] : r L ′ ⊆ V (V:L')\leftarrow r\in K[X_1,\cdots,X_n]:rL'\subseteq V (V:L)rK[X1,,Xn]:rLV where K K K is a finite field。
    猜想:For randomly chosen W W W, the probability ρ \rho ρ that ( V : L ) = W (V:L)=W (V:L)=W are very close to 1 1 1, when n > 2 n>2 n>2

  • HFE-DP: Hidden Field Equations Decomposition Problem。 It is the basis of the HFE crypto system.
    Let F F F be a finite field of order q q q and S , T ∈ A f f − 1 S,T\in Aff^{-1} S,TAff1 be two invertible, affine transformations over the vector space F n F^n Fn。Denote E : = G F ( q n ) E:=GF(q^n) E:=GF(qn) an extension field over F F F and ϕ : F n → E \phi:F^n\rightarrow E ϕ:FnE the bijection between this extension field and the corresponding vector space. We have ϕ − 1 ( ϕ ( a ) ) = a , ∀ a ∈ F n \phi^{-1}(\phi(a))=a,\forall a \in F^n ϕ1(ϕ(a))=a,aFn
    Now let P ( X ) : = ∑ i , j < D , q i + q j < D C i , j X q i + q j + ∑ q i < D B i X q i + A P(X):=\sum_{i,j<D,q^i+q^j<D}C_{i,j}X^{q^i+q^j}+\sum_{q^i<D}B_iX^{q^i}+A P(X):=i,j<D,qi+qj<DCi,jXqi+qj+qi<DBiXqi+A for finite field elements C i , j , B i , A ∈ E C_{i,j},B_i,A\in E Ci,j,Bi,AE the inner polynomial. This gives the public key:
    P ( x ) : = T ∘ P ∘ S ( x ) \mathcal{P}(x):=T\circ P\circ S(x) P(x):=TPS(x)
    or more precisely:
    P ( x ) : = T ∘ ϕ − 1 ∘ P ∘ ϕ ∘ S ( x ) \mathcal{P}(x):=T\circ \phi^{-1}\circ P\circ \phi \circ S(x) P(x):=Tϕ1PϕS(x)
    HFE Decomposition problem是指:已知公钥 P \mathcal{P} P,找到对应的私钥 ( S , P , T ) (S,P,T) (S,P,T)

  • HFE-SP: Hidden Field Equations Solving Problem。
    Let F F F be a finite field of order q q q and S , T ∈ A f f − 1 S,T\in Aff^{-1} S,TAff1 be two invertible, affine transformations over the vector space F n F^n Fn。Denote E : = G F ( q n ) E:=GF(q^n) E:=GF(qn) an extension field over F F F and ϕ : F n → E \phi:F^n\rightarrow E ϕ:FnE the bijection between this extension field and the corresponding vector space. We have ϕ − 1 ( ϕ ( a ) ) = a , ∀ a ∈ F n \phi^{-1}(\phi(a))=a,\forall a \in F^n ϕ1(ϕ(a))=a,aFn
    Now let P ( X ) : = ∑ i , j < D , q i + q j < D C i , j X q i + q j + ∑ q i < D B i X q i + A P(X):=\sum_{i,j<D,q^i+q^j<D}C_{i,j}X^{q^i+q^j}+\sum_{q^i<D}B_iX^{q^i}+A P(X):=i,j<D,qi+qj<DCi,jXqi+qj+qi<DBiXqi+A for finite field elements C i , j , B i , A ∈ E C_{i,j},B_i,A\in E Ci,j,Bi,AE the inner polynomial. This gives the public key:
    P ( x ) : = T ∘ P ∘ S ( x ) \mathcal{P}(x):=T\circ P\circ S(x) P(x):=TPS(x)
    or more precisely:
    P ( x ) : = T ∘ ϕ − 1 ∘ P ∘ ϕ ∘ S ( x ) \mathcal{P}(x):=T\circ \phi^{-1}\circ P\circ \phi \circ S(x) P(x):=Tϕ1PϕS(x)
    Hidden Field Equations Solving Problem是指:已知 y ∈ F n y\in F^n yFn,找到 x ∈ F n x\in F^n xFn使得 y = P ( x ) y=\mathcal{P}(x) y=P(x)成立。

  • MKS: Multiplicative Knapsack。Naccache and Stern 用于构建 trapdoor one-way permutation。
    已知正整数 p , c , n p,c,n p,c,n以及a set { v i } ∈ { 1 , ⋯   , p − 1 } n \{v_i\}\in\{1,\cdots,p-1\}^n {vi}{1,,p1}n,找到a binary vector x x x使得 c = ∏ i = 1 n v i x i c=\prod_{i=1}^{n}v_i^{x_i} c=i=1nvixi成立。

  • BP: Balance Problem。常用于Incremental hashing。
    已知a group G G G和 a set { v i } ∈ G n \{v_i\}\in G^n {vi}Gn,找到disjoint subsets I , J I,J I,J, not both empty,使得 ⨀ i ∈ I v i = ⨀ j ∈ J v j \bigodot_{i\in I}v_i=\bigodot_{j\in J}v_j iIvi=jJvj成立。

  • AHA: Adaptive Hardness Assumptions.
    We consider adaptive strengthenings of standard general hardness assumptions, such as the existence of one-way functions and pseudorandom generators.
    – A collection of adaptive 1 − 1 1-1 11 one-way functions is a family of 1 − 1 1-1 11 functions F n = { f s : { 0 , 1 } n → { 0 , 1 } n } F_n=\{f_s:\{0,1\}^n\rightarrow \{0,1\}^n\} Fn={fs:{0,1}n{0,1}n} such that for every s s s, it is hard to invert f s ( r ) f_s(r) fs(r) for a random r r r, even for an adversary that is granted access to an “inversion oracle” for f s ′ f_{s'} fs for ever s ′ ≠ s s'\neq s s=s. In other words, the function f s f_s fs is one-way, even with access to an oracle that invert all the functions in the family。
    – A sf collection of adaptive pseudo-random generators is a family of 1 − 1 1-1 11 functions G n = { G s : { 0 , 1 } n → { 0 , 1 } n } G_n=\{G_s:\{0,1\}^n\rightarrow \{0,1\}^n\} Gn={Gs:{0,1}n{0,1}n} such that for every s s s, it is hard to invert G s G_s Gs is pseudo-random, even for an adversary that is granted access to an oracle whether given y y y is in the range of G s ′ G_{s'} Gs for s ′ ≠ s s'\neq s s=s.

  • SPI: Sparse Polynomial Interpolation。常用于Identification scheme。参见2000年论文《AN IDENTIFICATION SCHEME BASED ON SPARSE POLYNOMIALS
    已知 A , a 0 , ⋯   , a k , C 1 , ⋯   , C k ∈ F q A,a_0,\cdots,a_k,C_1,\cdots,C_k\in \mathbb{F}_q A,a0,,ak,C1,,CkFq,找到 a polynomial f ( x ) ∈ F [ x ] f(x)\in\mathbb{F}[x] f(x)F[x] of degree at most q − 1 q-1 q1 使得 f ( 0 ) = A , f ( a 0 ) = 0 , f ( a i ) = C i f(0)=A,f(a_0)=0,f(a_i)=C_i f(0)=A,f(a0)=0,f(ai)=Ci for 1 ≤ i ≤ k 1\leq i\leq k 1ik and f ( x ) − A f(x)-A f(x)A has coefficients in { 0 , 1 } \{0,1\} {0,1}

  • SPP: Self-Power Problem。若该问题可破解,在可伪造EIGamal signature scheme中类型2和4的签名。
    已知prime p p p c ≡ x x m o d    p c\equiv x^x\mod p cxxmodp,求解 x x x

  • VDP: Vector Decomposition Problem。常用于AN IDENTIFICATION SCHEME BASED ON SPARSE POLYNOMIALS,AN IDENTIFICATION SCHEME BASED ON SPARSE POLYNOMIALS。
    已知a two-dimensional vector space V V V over a finite field, with basis e 1 , e 2 e_1,e_2 e1,e2,和 a vector v v v in V V V。找到 a multiple u u u of e 1 e_1 e1 使得 v − u v-u vu is a multiple of e 2 e_2 e2

  • 2-DL: 2-generalized Discrete Logarithm Problem。
    已知a group G G G of exponent r r r and order r 2 r^2 r2, with generators P 1 , P 2 P_1,P_2 P1,P2, and an element Q Q Q in G G G。找到 a pair of integers ( a , b ) (a,b) (a,b) 使得 Q = a P 1 + b P 2 Q=aP_1+bP_2 Q=aP1+bP2成立。

参考资料

[1] Can you give me a summary of cryptographic hardness assumptions?
[2] 2013年报告《Final Report on Main Computational Assumptions in Cryptography
[3] European Network of Excellence in Cryptology II
[4] 2012年 Cryptographic Primitives and Hard Problems in Cryptography wiki
[5] 2015年论文《Cryptographic Assumptions: A Position Paper

评论 13
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值