Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups Essam Ghadafi University of the West of England Jens Groth University College London
Prime order cyclic group •
Computational problems in cyclic groups •
Non-interactive computational assumptions Generic group model ? ? ? Computational Diffie-Hellman (CDH) Discrete logarithm (DL)
Non-interactive computational assumptions Generic group model Polynomial assumptions Fractional assumptions Computational Diffie-Hellman (CDH) Discrete logarithm problem (DL)
Conclusions • Cryptographers – Most non-interactive computational assumptions in use are implied by the GDHE & SFrac assumptions – All non-fractional assumptions are implied by GDHE, giving us a “canary in the coal mine” barrier • Cryptanalysts – The GDHE and SFrac assumptions are the easiest targets to attack – Do not try to break discrete log, attack the “canary in the coal mine” assumptions first