Let g g g为 a known element of prime order r r r in a group (with group operation written multiplicatively). Let G = < g > G=
常用的group选择有:
Discrete logarithm problem常用假设有:
DLP: discrete logarithm problem。常用于Schnorr signatures, DSA signatures。
已知 h ∈ G h\in G h∈G,找到 x x x使得 h = g x h=g^x h=gx。
CDH: computational Diffie-Hellman problem。常用于 Diffie-Hellman key exchange and variants, Elgamal encryption and variants, BLS signatures and variants。
已知 g a , g b ∈ G g^a,g^b\in G ga,gb∈G,计算 g a b g^{ab} gab。
SDH: static Diffie-Hellman problem。
Fix g , g a ∈ G g,g^a\in G g,ga∈G. Given h ∈ G h\in G h∈G,计算 h a h^a ha。
gap-CDH: Gap Diffie-Hellman problem。常用于 ECIES proof in the Random Oracle Model, Chaum undeniable signature。
已知 g a , g b ∈ G g^a,g^b\in G ga,gb∈G,计算 g a b g^{ab} gab,when the algorithm has access to an oracle which solves the DDH problem。
DDH: decision Diffie-Hellman problem。常用于 Diffie-Hellman key exchange and variants, Elgamal encryption and variants.
已知 g a , g b , h ∈ G g^a,g^b,h\in G ga,gb,h∈G,判断 h = g a b h=g^{ab} h=gab是否成立?
Strong-DDH: strong decision Diffie-Hellman problem
已知 g , g a , g b , g b − 1 , h ∈ G g,g^a,g^b,g^{b^{-1}},h\in G g,ga,gb,gb−1,h∈G,判断 h = g a b h=g^{ab} h=gab是否成立?
sDDH: skewed decision Diffie-Hellman problem。
Let f f f 为任意的uninvertible function with domain Z r \mathbb{Z}_r Zr。已知 f ( a ) , g b , h ∈ G f(a),g^b,h\in G f(a),gb,h∈G,判断 h = g a b h=g^{ab} h=gab是否成立?
PDDH: parallel decision Diffie-Hellman problem。
已知 g x 1 , ⋯ , g x n , h 1 , ⋯ , h n ∈ G g^{x_1},\cdots,g^{x_n},h_1,\cdots,h_n\in G gx1,⋯,gxn,h1,⋯,hn∈G,判断 h 1 = g x 1 x 2 , ⋯ , h n − 1 = g x n − 1 x n , h n = g x n x 1 h_1=g^{x_1x_2},\cdots,h_{n-1}=g^{x_{n-1}x_n},h_n=g^{x_nx_1} h1=gx1x2,⋯,hn−1=gxn−1xn,hn=gxnx1是否成立?
Square-DH: Square Diffie-Hellman problem. The best known algorithm for Square-DH is to actually solve the DLP.
已知 g a ∈ G g^a\in G ga∈G,计算 g a 2 g^{a^2} ga2。
l-DHI: l-Diffie-Hellman inversion problem. The best known algorithm for l-DHI is to actually solve the DHP.
已知 g a , g a 2 , ⋯ , g a l ∈ G g^a,g^{a^2},\cdots,g^{a^l}\in G ga,ga2,⋯,gal∈G,计算 g 1 / a g^{1/a} g1/a。
l-DDHI: l-Decisional Diffie-Hellman inversion problem
已知 g a , g a 2 , ⋯ , g a l , v ∈ G g^a,g^{a^2},\cdots,g^{a^l},v\in G ga,ga2,⋯,gal,v∈G,判断 v = g 1 / a v=g^{1/a} v=g1/a是否成立?
REPRESENTATION: Representation problem. The best known algorithm for REPRESENTATION is to solve the DLP.
已知 g 1 , ⋯ , g k , h ∈ G g_1,\cdots,g_k,h\in G g1,⋯,gk,h∈G,找到 a 1 , ⋯ , a k a_1,\cdots,a_k a1,⋯,ak使得 h = g 1 a 1 ⋯ g k a k h=g_1^{a_1}\cdots g_k^{a_k} h=g1a1⋯gkak成立。
LRSW: LRSW Problem. The best known algorithm for LRSW is to solve the DLP.
已知 g , g x , g y g,g^x,g^y g,gx,gy,已知 oracle O O O(输入为 s s s,其选择一个随机值 a = g z a=g^z a=gz,然后其输出为 ( a , a s y , a x + s x y ) (a,a^{sy},a^{x+sxy}) (a,asy,ax+sxy)),对于任意的 t t t(not one of the 输入 s s s)和 b ≠ 1 b\neq 1 b=1值 计算 ( t , b , b t y , b x + t x y ) (t,b,b^{ty},b^{x+txy}) (t,b,bty,bx+txy)。
Linear: Linear problem。The best known algorithm for Linear is to solve the DLP。
已知 g a , g b , g a c , g b d ∈ G g^a,g^{b},g^{ac},g^{bd}\in G ga,gb,gac,gbd∈G,计算 g c + d g^{c+d} gc+d。
D-Linear1: Decision Linear problem (version 1)
已知 g a , g b , g a c , g b d , v ∈ G g^a,g^{b},g^{ac},g^{bd},v\in G ga,gb,gac,gbd,v∈G,判断 v = g c + d v=g^{c+d} v=gc+d是否成立?
l-SDH: l-Strong Diffie-Hellman problem
已知 g a , g a 2 , ⋯ , g a l ∈ G g^a,g^{a^2},\cdots,g^{a^l}\in G ga,ga2,⋯,gal∈G,找到 w ∈ F q w\in F_q w∈Fq并计算 g 1 / ( a + w ) g^{1/(a+w)} g1/(a+w)。
c-DLSE: Discrete Logarithm with Short Exponents。The best known algorithm for the c-DLSE is to use the baby-step-giant-step or Pollard kangaroo algorithms for solving the DLP in a short interval. 常用于
Gennaro pseudorandom generator。
Let G = Z p ∗ G=\mathbb{Z}_p^* G=Zp∗ 其中 p − 1 = 2 q p-1=2q p−1=2q, p , q p,q p,q均为primes,let c c c为integer。已知 g x m o d p g^x \mod p gxmodp 且 0 ≤ x ≤ 2 c 0\leq x\leq 2^c 0≤x≤2c,求解相应的 x x x值。
CONF: (conference-key sharing scheme)。常用于Okamoto’s conference-key sharing scheme。
已知 g a , g b , g a b ∈ G g^a,g^b,g^{ab}\in G ga,gb,gab∈G,计算 g b g^{b} gb。
3PASS: 3-Pass Message Transmission Scheme。常用于Shamir’s 3-pass message transmission scheme。
已知 A , B , C ∈ G A,B,C\in G A,B,C∈G,找到相应的 s s s使得 A = s a , B = s b , C = s a b A=s^a,B=s^b,C=s^{ab} A=sa,B=sb,C=sab成立。
LUCAS: Lucas Problem。
已知 p , z ∈ < V t ( m ) > p,z\in
XLP: x-Logarithm Problem。
对于Elliptic curve E ( F q ) E(\mathbb{F}_q) E(Fq)上的任意一点 P = ( x , y ) ∈ F q 2 P=(x,y)\in\mathbb{F}_q^2 P=(x,y)∈Fq2,将 x ( P ) = x ˉ x(P)=\bar{x} x(P)=xˉ 表示为 P P P点$ X坐标的二进制表示。对任意的group element g a g^a ga, x = x ( g a ) x=x(g^a) x=x(ga),是否能区分 g a g^a ga和 g x g^x gx?
MDHP: Matching Diffie-Hellman Problem。常用于E-Cash。
Let g g g be a generator of group G G G having order q q q,let a 0 , b 0 , a 1 , b 1 ∈ Z q a_0,b_0,a_1,b_1\in\mathbb{Z}_q a0,b0,a1,b1∈Zq and r ∈ R { 0 , 1 } r\in_R\{0,1\} r∈R{ 0,1}。已知 ( g a 0 , g a 0 b 0 , g a 1 , g a 1 b 1 ) (g^{a_0},g^{a_0b_0},g^{a_1},g^{a_1b_1}) (ga0,ga0b0,ga1,ga1b1)和 ( g b r , g b 1 − r ) (g^{b_r},g^{b_{1-r}}) (gbr,gb1−r),找到相应的 r r r。
DDLP: Double Discrete Logarithm Problem。常用于Public verifiable secret sharing。
Let p , q p,q p,q 为素数且 q = ( p − 1 ) / 2 q=(p-1)/2 q=(p−1)/2,设置 G G G为group of order p p p with generator g g g, h ∈ Z p ∗ h\in\mathbb{Z}_p^* h∈Zp∗为an element of order q q q。已知 g , h , a = g ( h x ) g,h,a=g^{(h^x)} g,h,a=g(hx),求解 x x x。
rootDLP: Root of Discrete Logarithm Problem。常用于Camenisch and Stadler group signature scheme。
已知group generator g g g, positive integer e e e 和 a ∈ G a\in G a∈G,计算 x x x使得 a = g ( x e ) a=g^{(x^e)} a=g(xe)成立。
n-M-DDH: Multiple Decision Diffie-Hellman Problem。常用于 Group key exchange。
Let n ≥ 2 n\geq 2 n≥2, D = ( g x 1 , ⋯ , g x n , { g x i x j } 1 ≤ i < j ≤ n ) D=(g^{x_1},\cdots,g^{x_n},\{g^{x_ix_j}\}_{1\leq i< j\leq n}) D=(gx1,⋯,gxn,{ gxixj}1≤i<j≤n) 其中 x 1 , ⋯ , x n ∈ Z r x_1,\cdots,x_n\in\mathbb{Z}_r x1,⋯,xn∈Zr为随机值; D r a n d o m = ( g 1 , ⋯ , g n , { g i j } 1 ≤ i < j ≤ n ) D_{random}=(g_1,\cdots,g_n,\{g_{ij}\}_{1\leq i
l-HENSEL-DLP: l-Hensel Discrete Logarithm Problem。
Let G G G为a subgroup or prime order r r r in Z p ∗ \mathbb{Z}_p^* Zp∗,其中 p p p为a prime with polynomial binary length;Let 1 < g < p 1
DLP(Inn(G)): Discrete Logarithm Problem over Inner Automorphism Group。常用于MOR Public Key Cryptosystem。
已知 ϕ , ϕ s ∈ I n n ( G ) \phi,\phi^s\in Inn(G) ϕ,ϕs∈Inn(G) for s ∈ Z s\in\mathbb{Z} s∈Z,求解 s ( m o d ∣ ϕ ∣ ) s(\mod |\phi|) s(mod∣ϕ∣)。
IE: Inverse Exponent。
为l-DHI (l-Diffie-Hellman inversion problem) l = 1 l=1 l=1的特例情况。
TDH: The Twin Diffie-Hellman Assumption。
Let G G G 为 a cyclic group with generator g g g,and of prime order q q q。定义 d h ( X , Y ) = Z dh(X,Y)=Z dh(X,Y)=Z,其中 X = g x , Y = g y , Z = g x y X=g^x,Y=g^y,Z=g^{xy} X=gx,Y=gy,Z=gxy。定义twin DH function 2 d h : G 3 → G 2 ( X 1 , X 2 , Y ) → ( d h ( X 1 , Y ) , d h ( X 2 , Y ) ) 2dh: G^3\rightarrow G^2\ (X_1,X_2,Y)\rightarrow (dh(X_1,Y),dh(X_2,Y)) 2dh:G3→G2 (X1,X2,Y)→(dh(X1,Y),dh(X2,Y))。定义相应的twin DH predicate为: 2 d h p ( X 1 , X 2 , Y ^ , Z ^ 1 , Z ^ 2 ) = 1 i f f 2 d h ( X 1 , X 2 , Y ^ ) = ( Z ^ 1 , Z ^ 2 ) 2dhp(X_1,X_2,\hat{Y},\hat{Z}_1,\hat{Z}_2)=1\ iff\ 2dh(X_1,X_2,\hat{Y})=(\hat{Z}_1,\hat{Z}_2) 2dhp(X1,X2,Y^,Z^1,Z^2)=1 iff 2dh(X1,X2,Y^)=(Z^1,Z^2)。
twin DH assumption是指:已知random X 1 , X 2 , Y ∈ G X_1,X_2,Y\in G X1,X2,Y∈G,计算 2 d h ( X 1 , X 2 , Y ) 2dh(X_1,X_2,Y) 2dh(X1,X2,Y)很难。
strong twin DH assumption是指:已知 X 1 , X 2 , Y ∈ G X_1,X_2,Y\in G X1,X2,Y∈G along with access to a decision oracle for the predicate 2 d h p ( X 1 , X 2 , ⋅ , ⋅ , ⋅ ) 2dhp(X_1,X_2,\cdot,\cdot,\cdot) 2dhp(X1,X2,⋅,⋅,⋅) which on input ( Y ^ , Z ^ 1 , Z ^ 2 ) (\hat{Y},\hat{Z}_1,\hat{Z}_2) (Y^,Z^1,Z^2) returns 2 d h p ( X 1 , X 2 , Y ^ , Z ^ 1 , Z ^ 2 ) 2dhp(X_1,X_2,\hat{Y},\hat{Z}_1,\hat{Z}_2) 2dhp(X1,X2,Y^,Z^1,Z^2),计算 2 d h ( X 1 , X 2 , Y ) 2dh(X_1,X_2,Y) 2dh(X1,X2,Y)很难。
XTR-DL: XTR discrete logarithm problem。Most protocols based on DLP can be used with XTR.
Let T r ( g ) Tr(g) Tr(g) 为an XTR representation of an element of the XTR subgroup of F p 6 ∗ \mathbb{F}_{p^6}^* Fp6∗,已知 t t t,求解 x x x使得 t = T r ( g x ) t=Tr(g^x) t=Tr(gx)成立。
XTR-DH: XTR Diffie-Hellman problem。Most protocols based on DLP can be used with XTR.
Let T r ( g ) Tr(g) Tr(g) 为an XTR representation of an element of the XTR subgroup of F p 6 ∗ \mathbb{F}_{p^6}^* Fp6∗,已知 t 1 , t 2 t_1,t_2 t1,t2,求解 t 3 t_3 t3使得 t 1 = T r ( g x ) , t 2 = T r ( g y ) , t 3 = T r ( g x y ) t_1=Tr(g^x),t_2=Tr(g^y),t_3=Tr(g^{xy}) t1=Tr(gx),t2=Tr(gy),t3=Tr(gxy)成立。
XTR-DHD: XTR decision Diffie-Hellman problem.Most protocols based on DLP can be used with XTR.
Let T r ( g ) Tr(g) Tr(g) 为an XTR representation of an element of the XTR subgroup of F p 6 ∗ \mathbb{F}_{p^6}^* Fp6∗,已知 t 1 = T r ( g x ) , t 2 = T r ( g y ) , t 3 t_1=Tr(g^x),t_2=Tr(g^y),t_3 t1=Tr(gx),t2=Tr(gy),t3,判断 t 3 = T r ( g x y ) t_3=Tr(g^{xy}) t3=Tr(gxy)是否成立?
CL-DLP: discrete logarithms in class groups of imaginary quadratic orders。常用于key exchange。
为standard discrete logarithm problems in a class group of imaginary quadratic orders。
TV-DDH: Tzeng Variant Decision Diffie-Hellman problem。常用于Conference key agreement.
Let p , q = 2 p + 1 p,q=2p+1 p,q=2p+1均为素数,let G ⊆ F p ∗ G\subseteq \mathbb{F}_p^* G⊆Fp∗ 为subgroup of order q q q。 h ∈ G h\in G h∈G为 [ 1 , p − 1 ] [1,p-1] [1,p−1]内的整数, h m o d q h\mod q hmodq为 [ 0 , q − 1 ] [0,q-1] [0,q−1]内整数。已知 g 1 , g 2 ∈ G g_1,g_2\in G g1,g2∈G 且 0 ≤ u 1 , u 2 < q 0\leq u_1,u_20≤u1,u2<q
,取任意整数 a a a,判断 u 1 = g 1 a m o d q , u 2 = g 2 a m o d q u_1=g_1^a\mod q,u_2=g_2^a\mod q u1=g1amodq,u2=g2amodq是否成立?
n-DHE: n-Diffie-Hellman Exponent problem。常用于 Broadcast encryption, accumulators.
对于a group G G G of prime order q q q,let g i = g λ i , λ ← Z q g_i=g^{\lambda^i},\lambda\leftarrow \mathbb{Z}_q gi=gλi,λ←Zq,已知 { g , g 1 , g 2 , ⋯ , g n , g n + 2 , ⋯ , g 2 n } ∈ G 2 n \{g,g_1,g_2,\cdots,g_n,g_{n+2},\cdots,g_{2n}\}\in G^{2n} { g,g1,g2,⋯,gn,gn+2,⋯,g2n}∈G2n,计算 g n + 1 。 g_{n+1}。 gn+1。
Factoring problems通常针对的是products of two random primes。如 n = p q , n ∈ N n=pq,n\in\mathbb{N} n=pq,n∈N,其中 p , q p,q p,q均为素数。
通常基于安全考虑,定义强素数的形式为 p = 2 p ′ + 1 p=2p'+1 p=2p′+1,其中 p p p和 p ′ p' p′均为素数。
FACTORING: integer factorisation problem
已知正整数 n ∈ N n\in\mathbb{N} n∈N,寻找其素数因式分解 n = p 1 e 1 p 2 e 2 ⋯ p k e k n=p_1^{e_1}p_2^{e_2}\cdots p_k^{e_k} n=p1e1p2e2⋯pkek,其中 p i p_i pi为pairwise distinct 素数, e i > 0 e_i>0 ei>0。
SQRT: square roots modulo a composite
已知复合正整数 n ∈ N n\in\mathbb{N} n∈N 和 a square a a a modulo n n n,求 a a a modulo n n n的平方根,即求解integer x x x 使得 x 2 ≡ a ( m o d n ) x^2\equiv a\ (mod\ n) x2≡a (mod n)。
常用于Rabin encryption。
C H A R A C T E R d CHARACTER^d CHARACTERd: character problem
Let n n n和 d d d为正整数,已知 x ∈ Z n ∗ x\in\mathbb{Z}_n^* x∈Zn∗,设计算法 χ ( x ) \chi(x) χ(x),其中 χ \chi χ为a non-trivial character of Z n ∗ \mathbb{Z}_n^* Zn∗ of order d d d。
常用于Undeniable Signautres。
可看成是quadratic residuosity problem的generalisation。
M O V A d MOVA^d MOVAd: character problem
Let n ∈ Z , s ∈ Z + n\in\mathbb{Z},s\in\mathbb{Z}^+ n∈Z,s∈Z+, χ \chi χ为a character of order d d d on Z n ∗ \mathbb{Z}_n^* Zn∗。已知 s s s个pairs ( α i , χ ( α i ) ) (\alpha_i,\chi(\alpha_i)) (αi,χ(αi)),其中 α i ∈ Z n ∗ \alpha_i\in\mathbb{Z}_n^* αi∈Zn∗ for all i ∈ [ 1 , ⋯ , s ] i\in[1,\cdots,s] i∈[1,⋯,s], x ∈ Z n ∗ x\in\mathbb{Z}_n^* x∈Zn∗,计算 χ ( x ) \chi(x) χ(x)。
常用于Undeniable Signautres。
C Y C L O F A C T d CYCLOFACT^d CYCLOFACTd: factorisation in Z[θ]
Let θ \theta θ 为 d t h d^{th} dth root of unity, σ \sigma σ 为 an element of Z [ θ ] \mathbb{Z}[\theta] Z[θ],求 σ \sigma σ的因式分解。
F E R M A T d FERMAT^d FERMATd: factorisation in Z[θ]
Let θ \theta θ 为 d t h d^{th} dth root of unity, n ∈ Z n\in\mathbb{Z} n∈Z 使得 n = π π ˉ n=\pi\bar{\pi} n=ππˉ for some π ∈ Z [ θ ] \pi\in\mathbb{Z}[\theta] π∈Z[θ]。已知 n n n,求 π \pi π。
RSAP: RSA problem
已知正整数 n n n为至少2个素数的乘积,已知整数 e e e (coprime with φ ( n ) \varphi(n) φ(n)) 和整数 c c c,求整数 m m m使得 m e ≡ c ( m o d n ) m^e\equiv c\ (mod\ n) me≡c (mod n)成立。
Strong-RSAP: strong RSA problem
已知正整数 n n n为至少2个素数的乘积,已知整数 c c c,求奇数 e ≥ 3 e\geq 3 e≥3和整数 m m m,使得 m e ≡ c ( m o d n ) m^e\equiv c\ (mod\ n) me≡c (mod n)成立。
Difference-RSAP: Difference RSA problem
已知正整数 n n n为至少2个素数的乘积,已知an element D ∈ Z n ∗ D\in\mathbb{Z}_n^* D∈Zn∗ 和 m − 1 m-1 m−1 个pairs ( x i , y i ) (x_i,y_i) (xi,yi) 使得 x i e − y i e = D ( m o d n ) x_i^e-y_i^e=D\ (mod\ n) xie−yie=D (mod n),求解新的pair x m e − y m e = D ( m o d n ) x_m^e-y_m^e=D\ (mod\ n) xme−yme=D (mod n) 成立。
Partial-DL-ZN2P: Partial Discrete Logarithm problem in Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2∗
已知正整数 n = p q n=pq n=pq,其中 p = 2 p ′ + 1 , q = 2 q ′ + 1 p=2p'+1,q=2q'+1 p=2p′+1,q=2q′+1, p , p ′ , q , q ′ p,p',q,q' p,p′,q,q′均为素数,已知an element g ∈ Z n 2 ∗ g\in\mathbb{Z}_{n^2}^* g∈Zn2∗ of maximal order in G = Q R n 2 G=QR_{n^2} G=QRn2 和 h = g a m o d n 2 h=g^a\ mod\ n^2 h=ga mod n2 for some a ∈ { 1 , ⋯ , o r d ( G ) } a\in\{1,\cdots,ord(G)\} a∈{ 1,⋯,ord(G)},求解整数 x x x使得 x = a ( m o d n ) x=a\ (mod\ n) x=a (mod n)。
常用于homomorphic public key encryption, public key encryption with double trapdoor decryption mechanism。
DDH-ZN2P: Decision Diffie-Hellman problem over Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2∗
已知正整数 n = p q n=pq n=pq,其中 p = 2 p ′ + 1 , q = 2 q ′ + 1 p=2p'+1,q=2q'+1 p=2p′+1,q=2q′+1, p , p ′ , q , q ′ p,p',q,q' p,p′,q,q′均为素数,已知an element g ∈ Z n 2 ∗ g\in\mathbb{Z}_{n^2}^* g∈Zn2∗ of maximal order in G = Q R n 2 G=QR_{n^2} G=QRn2 和 elements X = g x m o d n 2 , Y = g y m o d n 2 X=g^x\ mod\ n^2, Y=g^y\ mod\ n^2 X=gx mod n2,Y=gy mod n2 for some x , y ∈ { 1 , ⋯ , o r d ( G ) } x,y\in\{1,\cdots,ord(G)\} x,y∈{ 1,⋯,ord(G)} 以及 Z ∈ G Z\in G Z∈G,判断 Z = g x y m o d n 2 Z=g^{xy}\ mod\ n^2 Z=gxy mod n2是否成立。
常用于public key encryption with double trapdoor decryption mechanism。
Lift-DH-ZN2P: Lift Diffie-Hellman problem over Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2∗
已知正整数 n = p q n=pq n=pq,其中 p = 2 p ′ + 1 , q = 2 q ′ + 1 p=2p'+1,q=2q'+1 p=2p′+1,q=2q′+1, p , p ′ , q , q ′ p,p',q,q' p,p′,q,q′均为素数,已知an element g ∈ Z n 2 ∗ g\in\mathbb{Z}_{n^2}^* g∈Zn2∗ of maximal order in G = Q R n 2 G=QR_{n^2} G=QRn2 和 elements X = g x m o d n 2 , Y = g y m o d n 2 X=g^x\ mod\ n^2, Y=g^y\ mod\ n^2 X=gx mod n2,Y=gy mod n2 for some x , y ∈ { 1 , ⋯ , o r d ( G ) } x,y\in\{1,\cdots,ord(G)\} x,y∈{ 1,⋯,ord(G)} 以及 Z = g x y m o d n Z=g^{xy}\ mod\ n Z=gxy mod n,求 Z ′ = g x y m o d n 2 Z'=g^{xy}\ mod\ n^2 Z′=gxy mod n2。
常用于public key encryption with double trapdoor decryption mechanism。
EPHP: Election Privacy Homomorphism problem
已知固定的小素数 e e e、素数 p p p 使得 e ∣ ( p − 1 ) e|(p-1) e∣(p−1)、素数 q q q使得 e ∤ ( q − 1 ) e\nmid (q-1) e∤(q−1),有 n = p q n=pq n=pq、 g ∈ Z n g\in\mathbb{Z}_n g∈Zn 且 e e e divides the order of g g g。由 g g g作为generator生成的group表示为 G G G。
EPHP是指:已知 w ∈ G w\in G w∈G、 v ∈ [ 0 , e ] v\in [0,e] v∈[0,e],是否存在 r ∈ N r\in N r∈N,使得 w = g v + e r w=g^{v+er} w=gv+er成立。存在的概率应高于 ( e − 1 ) / e (e-1)/e (e−1)/e。
常用于homomorphic public key encryption 和 electronic voting protocols。
AERP: Approximate e-th root problem
已知正整数 n = p 2 q n=p^2q n=p2q,其中 p , q p,q p,q为素数且 ∣ n ∣ = 3 k |n|=3k ∣n∣=3k,已知整数 e ≥ 4 e\geq 4 e≥4、 y ∈ Z n y\in\mathbb{Z}_n y∈Zn,求整数 x x x,使得 ( x e m o d n ) ∈ I k ( y ) (x^e\ mod\ n)\in I_k(y) (xe mod n)∈Ik(y)成立,其中 I k ( y ) = { u ∣ y ≤ u < y + 2 2 k − 1 } I_k(y)=\{u|y\leq u< y+2^{2k-1}\} Ik(y)={ u∣y≤u<y+22k−1}。
常用于ESIGN signature scheme。
l l l-HENSEL-RSAP: l l l-Hensel RSA
已知 N = p q N=pq N=pq, e e e coprime with ϕ ( N ) \phi(N) ϕ(N), x e ( m o d N ) x^e\ (mod\ N) xe (mod N) for a random integer 1 < x < N 1
常用于public-key encryption。
DSeRP: Decisional Small e-Residues in Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2∗
已知正整数 n = p q n=pq n=pq,其中 p , q p,q p,q为素数,已知整数 e > 2 e>2 e>2 使得 g c d ( e , n ( p − 1 ) ( q − 1 ) ) = 1 gcd(e,n(p-1)(q-1))=1 gcd(e,n(p−1)(q−1))=1,是否能区分 D 0 = { c = r e m o d n 2 ∣ r ∈ R Z n } D_0=\{c=r^e\ mod\ n^2|r\in_R\mathbb{Z}_n\} D0={ c=re mod n2∣r∈RZn} distribution 和 D 1 = { c ∈ R Z n 2 } D_1=\{c\in_R\mathbb{Z}_{n^2}\} D1={ c∈RZn2} distribution。
常用于Semantically secure public key encryption from Paillier-related assumptions。
DS2eRP: Decisional Small 2e-Residues in Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2∗
已知正整数 n = p q n=pq n=pq,其中 p , q p,q p,q为素数, p = q = 3 m o d 4 p=q=3\ mod\ 4 p=q=3 mod 4,已知整数 e e e 使得 g c d ( e , n ( p − 1 ) ( q − 1 ) ) = 1 gcd(e,n(p-1)(q-1))=1 gcd(e,n(p−1)(q−1))=1且 ∣ n ∣ / 2 < 3 < ∣ n ∣ |n|/2<3<|n| ∣n∣/2<3<∣n∣,是否能区分 D 0 = { c = r 2 e m o d n 2 ∣ r ∈ R Q R n } D_0=\{c=r^{2e}\ mod\ n^2|r\in_R QR_n\} D0={ c=r2e mod n2∣r∈RQRn} distribution 和 D 1 = { c ∈ R Q R n 2 } D_1=\{c\in_R QR_{n^2}\} D1={ c∈RQRn2} distribution。
常用于Semantically secure public key encryption mixing Paillier and Rabin functions。
DSmallRSAKP: Decisional Reciprocal RSA-Paillier in Z n 2 ∗ \mathbb{Z}_{n^2}^* Zn2∗
已知正整数 n = p q n=pq n=pq,其中 p , q p,q p,q为素数,已知an element α \alpha α使得 ( α / p ) = ( α / q ) = − 1 (\alpha/p)=(\alpha/q)=-1 (α/p)=(α/q)=−1,已知整数 e e e使得 ∣ n ∣ / 2 < e < ∣ n ∣ |n|/2
常用于Semantically secure public key encryption from Paillier-related assumptions。
HRP: Higher Residuosity Problem
ECSQRT: Square roots in elliptic curve groups over Z/nZ
RFP: Root Finding Problem
phiA: PHI-Assumption
C-DRSA: Computational Dependent-RSA problem
D-DRSA: Decisional Dependent-RSA problem
E-DRSA: Extraction Dependent-RSA problem
DCR: Decisional Composite Residuosity problem
CRC: Composite Residuosity Class problem
DCRC: Decisional Composite Residuosity Class problem
GenBBS: generalised Blum-Blum-Shub assumption
2008年《Pairings for cryptographers》中指出,pairings over groups of known prime order 表示为:
t ^ : G 1 × G 2 → G T \hat{t}:G_1\times G_2\rightarrow G_T t^:G1×G2→GT
若其中 G 1 , G 2 , G T G_1,G_2,G_T G1,G2,GT都具有相同的prime order l l l,则可分为以下三大类:
1)Type 1: G 1 = G 2 G_1=G_2 G1=G2;【通常使用supersingular curves,这些supersingular curves又分为两类:一类是over fields of characteristic 2 or 3 (with embedding degree 4 or 6 respectively);另一类是over fields of large prime characteristic (with embedding degree 2)。】
2)Type 2: G 1 ≠ G 2 G_1\neq G_2 G1=G2,但是存在efficiently computable homomorphism ϕ : G 2 → G 1 \phi:G_2\rightarrow G_1 ϕ:G2→G1;【通常使用ordinary curves,且the homomorphism from G 2 G_2 G2 to G 1 G_1 G1 is the trace map。】
3)Type3: G 1 ≠ G 2 G_1\neq G_2 G1=G2,且不存在efficiently computable homomorphism ϕ : G 2 → G 1 \phi:G_2\rightarrow G_1 ϕ:G2→G1。【通常使用ordinary curves,且 G 2 G_2 G2为the kernel of the trace map。】
若 G 2 G_2 G2 为non-cyclic group of order l 2 l^2 l2,则可称为Type 4。
具体举例为:
若 log g 1 a = log g 2 b \log_{g_1}a=\log_{g_2}b logg1a=logg2b,则表示为 a ∼ b a\sim b a∼b。
Pairing 相关假设有:【注意,有的assumption并不适于所有的pairing type。Certain assumptions are provably false w.r.t. certain group types.】
BDHP: Bilinear Diffie-Hellman Problem。
已知 g i a , g j b 和 g k c g_i^a,g_j^b和g_k^c gia,gjb和gkc,计算 t ^ ( g 1 , g 2 ) a b c \hat{t}(g_1,g_2)^{abc} t^(g1,g2)abc。
其中 i , j , k ∈ { 1 , 2 } i,j,k\in\{1,2\} i,j,k∈{ 1,2},对应有四种可能的组合 ( i , j , k ) ∈ { ( 1 , 1 , 1 ) , ( 1 , 1 , 2 ) , ( 1 , 2 , 2 ) , ( 2 , 2 , 2 ) } (i,j,k)\in\{(1,1,1),(1,1,2),(1,2,2),(2,2,2)\} (i,j,k)∈{ (1,1,1),(1,1,2),(1,2,2),(2,2,2)},也可称为 B D H P i , j , k BDHP_{i,j,k} BDHPi,j,k。
– 对于Type 1 pairing,以上四种组合是等价的。
– 对于Type 2 pairing,具有 B D H P 2 , 2 , 2 ≤ P B D H P 1 , 2 , 2 ≤ P B D H P 1 , 1 , 2 ≤ P B D H P 1 , 1 , 1 BDHP_{2,2,2}\leq_P BDHP_{1,2,2}\leq_P BDHP_{1,1,2}\leq_P BDHP_{1,1,1} BDHP2,2,2≤PBDHP1,2,2≤PBDHP1,1,2≤PBDHP1,1,1。
– 对于Type 3 pairing,这四种组合have no known reductions between them。
DBDH: Decision Bilinear Diffie-Hellman Problem。常用于 Boneh-Franklin ID-based encryption scheme。
已知 g i a , g j b , g k c 和 t ^ ( g 1 , g 2 ) z g_i^a,g_j^b,g_k^c和\hat{t}(g_1,g_2)^{z} gia,gjb,gkc和t^(g1,g2)z,判断 t ^ ( g 1 , g 2 ) a b c = t ^ ( g 1 , g 2 ) z \hat{t}(g_1,g_2)^{abc}=\hat{t}(g_1,g_2)^{z} t^(g1,g2)abc=t^(g1,g2)z是否成立。
l-BDHI: l-Bilinear Diffie-Hellman Inversion Problem
已知 g i a , g i a 2 , g i a 3 , ⋯ , g i a l g_i^{a},g_i^{a^2},g_i^{a^3},\cdots,g_i^{a^l} gia,gia2,gia3,⋯,gial,计算 t ^ ( g 1 , g 2 ) 1 / a \hat{t}(g_1,g_2)^{1/a} t^(g1,g2)1/a。其中 i ∈ { 1 , 2 } i\in\{1,2\} i∈{ 1,2}。
l-DBDHI: l-Bilinear Decision Diffie-Hellman Inversion Problem
已知 g i a , g i a 2 , g i a 3 , ⋯ , g i a l g_i^{a},g_i^{a^2},g_i^{a^3},\cdots,g_i^{a^l} gia,gia2,gia3,⋯,gial和 v ∈ G T v\in G_T v∈GT,判断 v = t ^ ( g 1 , g 2 ) 1 / a v=\hat{t}(g_1,g_2)^{1/a} v=t^(g1,g2)1/a是否成立?其中 i ∈ { 1 , 2 } i\in\{1,2\} i∈{ 1,2}。
l-wBDHI: l-weak Bilinear Diffie-Hellman Inversion Problem。
已知 g i a , g i a 2 , g i a 3 , ⋯ , g i a l g_i^{a},g_i^{a^2},g_i^{a^3},\cdots,g_i^{a^l} gia,gia2,gia3,⋯,gial和 g j b g_j^b gjb,计算 t ^ ( g 1 , g 2 ) a l + 1 b \hat{t}(g_1,g_2)^{a^{l+1}b} t^(g1,g2)al+1b。其中 i ∈ { 1 , 2 } i\in\{1,2\} i∈{ 1,2}。
l-wDBDHI: l-weak Decisional Bilinear Diffie-Hellman Inversion Problem
已知 g i a , g i a 2 , g i a 3 , ⋯ , g i a l , g ) j b g_i^{a},g_i^{a^2},g_i^{a^3},\cdots,g_i^{a^l},g)j^b gia,gia2,gia3,⋯,gial,g)jb和 v ∈ G T v\in G_T v∈GT,判断 v = t ^ ( g 1 , g 2 ) a l + 1 b v=\hat{t}(g_1,g_2)^{a^{l+1}b} v=t^(g1,g2)al+1b是否成立?其中 i ∈ { 1 , 2 } i\in\{1,2\} i∈{ 1,2}。
KSW2: Assumption 2 of Katz-Sahai-Waters。首次用于 the construction of a predicate encryption scheme supporting the inner product。(KATZ等人2008年论文《Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products》)
– 运行 G ( 1 n ) G(1^n) G(1n)来获取 ( p , q , r , G , G T , t ^ ) (p,q,r,G,G_T,\hat{t}) (p,q,r,G,GT,t^);
– 设置 N = p q r N=pqr N=pqr,let g p , g q , g r g_p,g_q,g_r gp,gq,gr分别为 G p , G q , G r G_p,G_q,G_r Gp,Gq,Gr的generators;
– 选择随机数 h ∈ G p ; Q 1 , Q 2 ∈ G q ; s , γ ∈ Z q h\in G_p;Q_1,Q_2\in G_q;s,\gamma\in\mathbb{Z}_q h∈Gp;Q1,Q2∈Gq;s,γ∈Zq以及random bit v v v;
– p.p.t. adversary A A A 的输入有 ( N , G , G T , t ^ ) (N,G,G_T,\hat{t}) (N,G,GT,t^)和 g p , g q , g r , h , g p s , h s Q 1 , g p γ Q 2 , t ^ ( g p , h ) γ g_p,g_q,g_r,h,g_p^s,h^sQ_1,g_p^{\gamma}Q_2,\hat{t}(g_p,h)^{\gamma} gp,gq,gr,h,gps,hsQ1,gpγQ2,t^(gp,h)γ,当 v = 0 v=0 v=0时,再给 A A A 输入 t ^ ( g p , h ) γ s \hat{t}(g_p,h)^{\gamma s} t^(gp,h)γs;当 v = 1 v=1 v=1时,给 A A A的输入为a random element of G T G_T GT。 A A A的输出为a bit v ′ v' v′,且其succeed if v ′ = v v'=v v′=v。
MSEDH: Multi-sequence of Exponents Diffie-Hellman Assumption。用于 Delerabl´ee and Pointcheval dynamic threshold public-key encryption scheme。
– Let B = ( p , G 1 , G 2 , G T , t ^ ( ⋅ , ⋅ ) ) B=(p,G_1,G_2,G_T,\hat{t}(\cdot,\cdot)) B=(p,G1,G2,GT,t^(⋅,⋅))为a bilinear map group system,let l , m , t l,m,t l,m,t为3个整数,let g 0 g_0 g0为 G 1 G_1 G1的generator, h 0 h_0 h0为 G 2 G_2 G2的generator。
– 输入为2个random coprime polynomials f f f和 g g g,分别具有degree l l l和 m m m,分别具有pairwise distinct roots x 1 , ⋯ , x l x_1,\cdots,x_l x1,⋯,xl和 y 1 , ⋯ , y m y_1,\cdots,y_m y1,⋯,ym。同时有 T ∈ G T T\in G_T T∈GT以及如下的exponentiations 序列:
判断 T T T是否与 t ^ ( g 0 , h 0 ) k ⋅ f ( γ ) \hat{t}(g_0,h_0)^{k\cdot f(\gamma)} t^(g0,h0)k⋅f(γ)相等或者与 G T G_T GT中的某随机元素相同?
SXDH assumption: the SXDH assumption states that there are prime-order groups ( G 1 , G 2 , G T ) (G_1, G_2, G_T ) (G1,G2,GT) that admits a bilinear map e : G 1 × G 2 → G T e : G_1 \times G_2 \rightarrow G_T e:G1×G2→GT such that the Decisional Diffie-Hellman (DDH) assumption holds in both G 1 G_1 G1 and G 2 G_2 G2. 首次在2005年论文《Correlation-Resistant Storage via Keyword-Searchable Encryption》中提出:
而在 2019年论文《Proofs for Inner Pairing Products and Applications》中指出,SXDH assumption仅在Type 3 pairings 下成立,因此任何基于SXDH assumption的设计均对应应采用Type 3 pairing。
DBP: double pairing assumption。在2016年论文《Structure-Preserving Signatures and Commitments to Group Elements》中提出。
KEA1: Knowledge of Exponent assumption。参见2004年论文《The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols》:
背景知识为:Let q q q be a prime such that 2 q + 1 2q+1 2q+1 is also prime, and let g g g be a generator of the order q q q subgroup of Z 2 q + 1 ∗ Z_{2q+1}^* Z2q+1∗。假设输入有 q , g , g a q,g,g^a q,g,ga,想要输出a pair ( C , Y ) , Y = C a (C,Y), Y=C^a (C,Y),Y=Ca。可实现的方式之一是pick some c ∈ Z q c\in\mathbb{Z}_q c∈Zq,设置 C = g c C=g^c C=gc,则有 Y = ( g a ) c = C a Y=(g^a)^c=C^a Y=(ga)c=Ca成立。直观上来说,KEA1假设是指这是唯一的方式。对于任意的adversary能输出such a pair的,其肯定知道相应的 c c c值使得 g c = C g^c=C gc=C。在以下的正式定义中引入了extractor可返回相应的 c c c值:
KEA1 (Knowledge of Exponent assumption) 的定义为: For any adversary A A A that takes input q , g , g a q,g,g^a q,g,ga,返回 ( C , Y ) (C,Y) (C,Y)其中 Y = C a Y=C^a Y=Ca,即意味着存在an extractor A A A,对于与adversary相同的输入,可返回 c c c值,使得 g c = C g^c=C gc=C。
MQ: Multivariable Quadratic equations。多变量二次方程式。
已知a system of m m m quadratic polynomial equations in n n n variables each, { y 1 = p 1 ( x 1 , ⋯ , x n ) , ⋯ , y m = p m ( x 1 , ⋯ , x n ) } \{y_1=p_1(x_1,\cdots,x_n),\cdots,y_m=p_m(x_1,\cdots,x_n)\} { y1=p1(x1,⋯,xn),⋯,ym=pm(x1,⋯,xn)},求解 x ∈ F n x\in\mathbb{F}^n x∈Fn 为 in general an NP-problem。
CF: Given-weight codeword finding。常用于: McEliece public key cryptosystem (finding the shortest codeword).
已知 n × k n\times k n×k binary linear code C C C和相应的 n × ( n − k ) n\times (n-k) n×(n−k) parity check matrix H H H,求解vector x ⃗ \vec{x} x使得 x ⃗ H = 0 \vec{x}H=0 xH=0成立且 x x x has weight w w w。
ConjSP: Braid group conjugacy search problem。
已知 x , y ∈ B n x,y\in B_n x,y∈Bn,求解 a ∈ B n a\in B_n a∈Bn使得 a − 1 x a = y a^{-1}xa=y a−1xa=y成立。
GenConjSP: Generalised braid group conjugacy search problem。用于 Public-key cryptosystem due to Ko, Lee, Cheon, Han, Kang and Park。
已知 x , y ∈ B n x,y\in B_n x,y∈Bn,求解 a ∈ B m , m ≤ n a\in B_m,m\leq n a∈Bm,m≤n使得 a − 1 x a = y a^{-1}xa=y a−1xa=y成立。
ConjDecomP: Braid group conjugacy decomposition problem。
已知 x , y ∈ B n x,y\in B_n x,y∈Bn, y = b x b − 1 y=bxb^{-1} y=bxb−1 for some b ∈ B n b\in B_n b∈Bn,求解 a ′ , a ′ ′ ∈ B m , m < n a',a''\in B_m,m
ConjDP: Braid group conjugacy decision problem。
已知 x , y ∈ B n x,y\in B_n x,y∈Bn,判断 x x x和 y y y是否conjugate?即是否存在 a ∈ B n a\in B_n a∈Bn使得 a − 1 x a = y a^{-1}xa=y a−1xa=y成立?
DHCP: Braid group decisional Diffie-Hellman-type conjugacy problem。常用于 Public-key cryptosystem, pseudorandom number generator, pseudorandom synthesizer。
已知 a , w l − 1 a w l , w u − 1 a w u a,w_l^{-1}aw_l,w_u^{-1}aw_u a,wl−1awl,wu−1awu,判断 x u − 1 x l − 1 a x l x u = w u − 1 w l − 1 a w l w u x_u^{-1}x_l^{-1}ax_lx_u=w_u^{-1}w_l^{-1}aw_lw_u xu−1xl−1axlxu=wu−1wl−1awlwu是否成立?for a ∈ B n , x l , w l ∈ B l a\in B_n,x_l,w_l\in B_l a∈Bn,xl,wl∈Bl and x u , w u ∈ B u x_u,w_u\in B_u xu,wu∈Bu。
ConjSearch: (multiple simlutaneous) Braid group conjugacy search problem。
Let B B B be a braid group, g ˉ = ( g 1 , ⋯ , g k ) \bar{g}=(g_1,\cdots,g_k) gˉ=(g1,⋯,gk) and h ˉ = ( h 1 , ⋯ , h k ) \bar{h}=(h_1,\cdots,h_k) hˉ=(h1,⋯,hk) be two tuples of elements of B B B。查找 x ∈ B x\in B x∈B使得 h ˉ = x − 1 g ˉ x \bar{h}=x^{-1}\bar{g}x hˉ=x−1gˉx成立。
SubConjSearch: subgroup restricted Braid group conjugacy search problem。常用于Anshel- Anshel- Goldfeld key exchange protocol (AAG)。
Let B B B be a braid group, and A A A a subgroup of B B B generated by some { a 1 , ⋯ , a r } \{a_1,\cdots,a_r\} { a1,⋯,ar} and let g ˉ = ( g 1 , ⋯ , g k ) \bar{g}=(g_1,\cdots,g_k) gˉ=(g1,⋯,gk) and h ˉ = ( h 1 , ⋯ , h k ) \bar{h}=(h_1,\cdots,h_k) hˉ=(h1,⋯,hk) be two tuples of elements of B B B。查找 x ∈ A x\in A x∈A, as a word in { a 1 , ⋯ , a r } \{a_1,\cdots,a_r\} { a1,⋯,ar},使得 h ˉ = x − 1 g ˉ x \bar{h}=x^{-1}\bar{g}x hˉ=x−1gˉx成立。
LINPOLY : A linear algebra problem on polynomials。
Let W W W be a linear space of dimension ≤ n \leq n ≤n consisting of quadratic forms in n n n variables X 1 , ⋯ , X n X_1,\cdots,X_n X1,⋯,Xn。已知 V = ∑ 1 ≤ i ≤ n X i W V=\sum_{1\leq i\leq n}X_iW V=∑1≤i≤nXiW,is it possible (and how) to uniquely determine W W W? For any subspace L ′ L' L′ of the linear space L L L generated by X 1 , ⋯ , X n X_1,\cdots,X_n X1,⋯,Xn。Let ( V : L ′ ) ← r ∈ K [ X 1 , ⋯ , X n ] : r L ′ ⊆ V (V:L')\leftarrow r\in K[X_1,\cdots,X_n]:rL'\subseteq V (V:L′)←r∈K[X1,⋯,Xn]:rL′⊆V where K K K is a finite field。
猜想:For randomly chosen W W W, the probability ρ \rho ρ that ( V : L ) = W (V:L)=W (V:L)=W are very close to 1 1 1, when n > 2 n>2 n>2。
HFE-DP: Hidden Field Equations Decomposition Problem。 It is the basis of the HFE crypto system.
Let F F F be a finite field of order q q q and S , T ∈ A f f − 1 S,T\in Aff^{-1} S,T∈Aff−1 be two invertible, affine transformations over the vector space F n F^n Fn。Denote E : = G F ( q n ) E:=GF(q^n) E:=GF(qn) an extension field over F F F and ϕ : F n → E \phi:F^n\rightarrow E ϕ:Fn→E the bijection between this extension field and the corresponding vector space. We have ϕ − 1 ( ϕ ( a ) ) = a , ∀ a ∈ F n \phi^{-1}(\phi(a))=a,\forall a \in F^n ϕ−1(ϕ(a))=a,∀a∈Fn。
Now let P ( X ) : = ∑ i , j < D , q i + q j < D C i , j X q i + q j + ∑ q i < D B i X q i + A P(X):=\sum_{i,j
P ( x ) : = T ∘ P ∘ S ( x ) \mathcal{P}(x):=T\circ P\circ S(x) P(x):=T∘P∘S(x)
or more precisely:
P ( x ) : = T ∘ ϕ − 1 ∘ P ∘ ϕ ∘ S ( x ) \mathcal{P}(x):=T\circ \phi^{-1}\circ P\circ \phi \circ S(x) P(x):=T∘ϕ−1∘P∘ϕ∘S(x)
HFE Decomposition problem是指:已知公钥 P \mathcal{P} P,找到对应的私钥 ( S , P , T ) (S,P,T) (S,P,T)。
HFE-SP: Hidden Field Equations Solving Problem。
Let F F F be a finite field of order q q q and S , T ∈ A f f − 1 S,T\in Aff^{-1} S,T∈Aff−1 be two invertible, affine transformations over the vector space F n F^n Fn。Denote E : = G F ( q n ) E:=GF(q^n) E:=GF(qn) an extension field over F F F and ϕ : F n → E \phi:F^n\rightarrow E ϕ:Fn→E the bijection between this extension field and the corresponding vector space. We have ϕ − 1 ( ϕ ( a ) ) = a , ∀ a ∈ F n \phi^{-1}(\phi(a))=a,\forall a \in F^n ϕ−1(ϕ(a))=a,∀a∈Fn。
Now let P ( X ) : = ∑ i , j < D , q i + q j < D C i , j X q i + q j + ∑ q i < D B i X q i + A P(X):=\sum_{i,j
P ( x ) : = T ∘ P ∘ S ( x ) \mathcal{P}(x):=T\circ P\circ S(x) P(x):=T∘P∘S(x)
or more precisely:
P ( x ) : = T ∘ ϕ − 1 ∘ P ∘ ϕ ∘ S ( x ) \mathcal{P}(x):=T\circ \phi^{-1}\circ P\circ \phi \circ S(x) P(x):=T∘ϕ−1∘P∘ϕ∘S(x)
Hidden Field Equations Solving Problem是指:已知 y ∈ F n y\in F^n y∈Fn,找到 x ∈ F n x\in F^n x∈Fn使得 y = P ( x ) y=\mathcal{P}(x) y=P(x)成立。
MKS: Multiplicative Knapsack。Naccache and Stern 用于构建 trapdoor one-way permutation。
已知正整数 p , c , n p,c,n p,c,n以及a set { v i } ∈ { 1 , ⋯ , p − 1 } n \{v_i\}\in\{1,\cdots,p-1\}^n { vi}∈{ 1,⋯,p−1}n,找到a binary vector x x x使得 c = ∏ i = 1 n v i x i c=\prod_{i=1}^{n}v_i^{x_i} c=∏i=1nvixi成立。
BP: Balance Problem。常用于Incremental hashing。
已知a group G G G和 a set { v i } ∈ G n \{v_i\}\in G^n { vi}∈Gn,找到disjoint subsets I , J I,J I,J, not both empty,使得 ⨀ i ∈ I v i = ⨀ j ∈ J v j \bigodot_{i\in I}v_i=\bigodot_{j\in J}v_j ⨀i∈Ivi=⨀j∈Jvj成立。
AHA: Adaptive Hardness Assumptions.
We consider adaptive strengthenings of standard general hardness assumptions, such as the existence of one-way functions and pseudorandom generators.
– A collection of adaptive 1 − 1 1-1 1−1 one-way functions is a family of 1 − 1 1-1 1−1 functions F n = { f s : { 0 , 1 } n → { 0 , 1 } n } F_n=\{f_s:\{0,1\}^n\rightarrow \{0,1\}^n\} Fn={ fs:{ 0,1}n→{ 0,1}n} such that for every s s s, it is hard to invert f s ( r ) f_s(r) fs(r) for a random r r r, even for an adversary that is granted access to an “inversion oracle” for f s ′ f_{s'} fs′ for ever s ′ ≠ s s'\neq s s′=s. In other words, the function f s f_s fs is one-way, even with access to an oracle that invert all the functions in the family。
– A sf collection of adaptive pseudo-random generators is a family of 1 − 1 1-1 1−1 functions G n = { G s : { 0 , 1 } n → { 0 , 1 } n } G_n=\{G_s:\{0,1\}^n\rightarrow \{0,1\}^n\} Gn={ Gs:{ 0,1}n→{ 0,1}n} such that for every s s s, it is hard to invert G s G_s Gs is pseudo-random, even for an adversary that is granted access to an oracle whether given y y y is in the range of G s ′ G_{s'} Gs′ for s ′ ≠ s s'\neq s s′=s.
SPI: Sparse Polynomial Interpolation。常用于Identification scheme。参见2000年论文《AN IDENTIFICATION SCHEME BASED ON SPARSE POLYNOMIALS》
已知 A , a 0 , ⋯ , a k , C 1 , ⋯ , C k ∈ F q A,a_0,\cdots,a_k,C_1,\cdots,C_k\in \mathbb{F}_q A,a0,⋯,ak,C1,⋯,Ck∈Fq,找到 a polynomial f ( x ) ∈ F [ x ] f(x)\in\mathbb{F}[x] f(x)∈F[x] of degree at most q − 1 q-1 q−1 使得 f ( 0 ) = A , f ( a 0 ) = 0 , f ( a i ) = C i f(0)=A,f(a_0)=0,f(a_i)=C_i f(0)=A,f(a0)=0,f(ai)=Ci for 1 ≤ i ≤ k 1\leq i\leq k 1≤i≤k and f ( x ) − A f(x)-A f(x)−A has coefficients in { 0 , 1 } \{0,1\} { 0,1}。
SPP: Self-Power Problem。若该问题可破解,在可伪造EIGamal signature scheme中类型2和4的签名。
已知prime p p p和 c ≡ x x m o d p c\equiv x^x\mod p c≡xxmodp,求解 x x x。
VDP: Vector Decomposition Problem。常用于AN IDENTIFICATION SCHEME BASED ON SPARSE POLYNOMIALS,AN IDENTIFICATION SCHEME BASED ON SPARSE POLYNOMIALS。
已知a two-dimensional vector space V V V over a finite field, with basis e 1 , e 2 e_1,e_2 e1,e2,和 a vector v v v in V V V。找到 a multiple u u u of e 1 e_1 e1 使得 v − u v-u v−u is a multiple of e 2 e_2 e2。
2-DL: 2-generalized Discrete Logarithm Problem。
已知a group G G G of exponent r r r and order r 2 r^2 r2, with generators P 1 , P 2 P_1,P_2 P1,P2, and an element Q Q Q in G G G。找到 a pair of integers ( a , b ) (a,b) (a,b) 使得 Q = a P 1 + b P 2 Q=aP_1+bP_2 Q=aP1+bP2成立。
[1] Can you give me a summary of cryptographic hardness assumptions?
[2] 2013年报告《Final Report on Main Computational Assumptions in Cryptography》
[3] European Network of Excellence in Cryptology II
[4] 2012年 Cryptographic Primitives and Hard Problems in Cryptography wiki
[5] 2015年论文《Cryptographic Assumptions: A Position Paper》