Score:1

DDH, CDH and discrete logarithm assumptions

fi flag

When we consider a group generation algorithm $\mathcal{G}$ (taken from Katz and Lindell's Introduction to Modern Cryptography), that takes as input a security parameter $1^n$ and outputs $(\mathbb{Z}_n, n, g)$, where $\mathbb{Z}_n$ is an additive group, can we say that the DDH, CDH, and discrete logarithm assumptions hold?

On the other hand, if they don't hold for any $g$, which conditions do we need to assert on the generator?

poncho avatar
my flag
None of the assumptions DDH, CDH or DLog are true in $\mathbb{Z}_n^+$; if you need those, you need to use a different group
Caio Nogueira avatar
fi flag
@poncho thank you for helping. I still don't fully understand how we can compute the discrete logarithm for $\mathbb{Z}_n$ in polynomial time. According to the book, it relies on the definition of a multiplicative group.
poncho avatar
my flag
What my comments was based on was your text "... where $\mathbb{Z}_n$ is an additive group". It is quite unusual to represent $\mathbb{Z}_n^*$ as an additive group (that is, you use the group operation syntax $A+B$, which is commonly implemented as $A \times B \bmod n$); the other alternative is the group $\mathbb{Z}_n^+$ (where the above problems are easily solvable in polynomial time)
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.