Skip to main content

Questions tagged [diffie-hellman]

The Diffie–Hellman key agreement is an anonymous, non-authenticated key-agreement protocol.

5 votes
2 answers
137 views

It is widely known that elliptic curve Diffie-Hellman is vulnerable to maliciously crafted public keys, where a honestly generated private key combined with a malicious public key may result in ...
twisteroid ambassador's user avatar
2 votes
1 answer
61 views

There s many paper that explore making bilinear pairings efficient, but as far I understand, they also aim at making the final exponentiation simpler. In my case I have an inversion algorithm whose ...
user2284570's user avatar
-1 votes
1 answer
141 views

Given prime $p$, generator $g$ of $\mathbb Z_p^*$ and $h_1,h_2,h_3\in\mathbb Z_p^*$ is $$\log_ph_3=(\log_ph_1)(\log_ph_2)$$ where at every $i\in\{1,2,3\}\mbox{ }g^{\log_ph_i}\equiv h_i\bmod p$ holds? ...
Turbo's user avatar
  • 1,215
0 votes
0 answers
35 views

I was given the following explaination, some parts of it are wrong but others looks truethefull: Here is the rigorous mathematical explanation of why this technique works. The validity of the formula $...
user2284570's user avatar
4 votes
1 answer
508 views

I have been using lifted ElGamal for my binary choice encryption into an exponent $g^m$, where m=0 or m=1. After ciphertext aggregation and decryption I got a message as $g^{m1+m2+m3+...+mn}$ and I ...
ojacomarket's user avatar
1 vote
1 answer
123 views

This question is purely to satisfy my curiosity - I'm not attempting to implement my own encryption, I'm just curious. Let's say Alice and Bob establish a communication channel, and the first thing ...
user avatar
4 votes
0 answers
89 views

I m looking for a way to perform pairings without final exponentiation or where the last step is easy to inverse (in order to perform pairing inversion through Miller inversion using https://eprint....
user2284570's user avatar
0 votes
0 answers
79 views

I have a private wallet backup file from Bitpie/imToken created in June 2023. The new version of the official app no longer supports importing this format. The file content is a JSON object in this ...
MingYang's user avatar
3 votes
1 answer
324 views

I am trying to understand how Apple Data Protection model works. I have come across this: NSFileProtectionCompleteUnlessOpen: Some files may need to be written while the device is locked or the user ...
user134238's user avatar
8 votes
2 answers
3k views

In Diffie and Hellmanns famous paper New Directions in Cryptography from 1976, figure 1 on p. 645 (resp. second page in the linked pdf) visualizes the flow of information in symmetric cryptosystems. ...
ATW's user avatar
  • 253
3 votes
1 answer
166 views

I'm having trouble understanding the difference between 3DH and X3DH when it comes to deniability. According to Signal's X3DH spec, deniability is relatively straight-forward. And indeed, there are ...
Synchronous's user avatar
1 vote
0 answers
69 views

Simple question : everything is in the title : Pairings allows transferring the ecdlp to finite field dlp and I want to do the reverse : the aim isn’t to find a secret point but to transfer the finite ...
user2284570's user avatar
0 votes
1 answer
115 views

According to this paper page 248 and unlike it’s title subject, it’s possible to invert a pairing on ʙɴ curves if exponentiation inversion is easy… But what about cases where final exponentiation isn’...
user2284570's user avatar
1 vote
1 answer
129 views

Sorry for my English. I assume that in Diffie-Hellman key exchange, $a=p−2$ is a bad choice. Example: $p=11, g = 7$ Alice chooses a private key $a = 9$ and computes a public key $A = 7^9 \pmod {11} = ...
Vladlin Moiseenko's user avatar
0 votes
0 answers
30 views

I was thinking about one paper I was writing and suddenly it occurred to me that I can build k-out of n oblivious transfer using any of the blindable one-more type problems (One more RSA-inversion, ...
Manish Adhikari's user avatar

15 30 50 per page
1
2 3 4 5
76