In order to analyze a variety of cryptosystems, Boneh, Boyen and Goh introduced a general framework, the Uber assumption. In this article, we explore some particular instances of this Uber assumption; namely the n-CDH-assumption, the nth-CDH-assumption and the QCDH- assumption. We analyse their relationships from a security point of view. Our analysis does not rely on any other property of the considered group and, in particular, does not use the generic group model.
CITATION STYLE
Joux, A., & Rojat, A. (2015). Security ranking among assumptions within the uber assumption framework. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7807, pp. 391–406). Springer Verlag. https://doi.org/10.1007/978-3-319-27659-5_28
Mendeley helps you to discover research relevant for your work.