A structural comparison of the computational difficulty of breaking discrete log cryptosystems

23Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The complexity of breaking cryptosystems of which security is based on the discrete logarithm problem is explored. The cryptosystems mainly discussed are the Diffie-Hellman key exchange scheme (DH), the Bellare-Micali noninteractive oblivious transfer scheme (EM), the ElGamal public-key cryptosystem (EG), the Okamoto conference-key sharing scheme (CONF), and the Shamir 3-pass key-transmission scheme (3PASS). The obtained relation among these cryptosystems is that 3 PASS < CONF < EG =£" BM s DH, where

Cite

CITATION STYLE

APA

Sakurai, K., & Shizuya, H. (1998). A structural comparison of the computational difficulty of breaking discrete log cryptosystems. Journal of Cryptology, 11(1), 29–43. https://doi.org/10.1007/s001459900033

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free