The complexity of breaking cryptosystems of which security is based on the discrete logarithm problem is explored. The cryptosystems mainly discussed are the Diffie-Hellman key exchange scheme (DH), the Bellare-Micali noninteractive oblivious transfer scheme (EM), the ElGamal public-key cryptosystem (EG), the Okamoto conference-key sharing scheme (CONF), and the Shamir 3-pass key-transmission scheme (3PASS). The obtained relation among these cryptosystems is that 3 PASS < CONF < EG =£" BM s DH, where
CITATION STYLE
Sakurai, K., & Shizuya, H. (1998). A structural comparison of the computational difficulty of breaking discrete log cryptosystems. Journal of Cryptology, 11(1), 29–43. https://doi.org/10.1007/s001459900033
Mendeley helps you to discover research relevant for your work.