Security ranking among assumptions within the uber assumption framework

2Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In order to analyze a variety of cryptosystems, Boneh, Boyen and Goh introduced a general framework, the Uber assumption. In this article, we explore some particular instances of this Uber assumption; namely the n-CDH-assumption, the nth-CDH-assumption and the QCDH- assumption. We analyse their relationships from a security point of view. Our analysis does not rely on any other property of the considered group and, in particular, does not use the generic group model.

Cite

CITATION STYLE

APA

Joux, A., & Rojat, A. (2015). Security ranking among assumptions within the uber assumption framework. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7807, pp. 391–406). Springer Verlag. https://doi.org/10.1007/978-3-319-27659-5_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free