Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes

  • Authors:
  • Dan Boneh;Ramarathnam Venkatesan

  • Affiliations:
  • -;-

  • Venue:
  • CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

We show that computing the most significant bits of the secret key in a Diffie-Hellman key-exchange protocol from the public keys of the participants is as hard as computing the secret key itself. This is done by studying the following hidden number problem: Given an oracle Oα(x) that on input x computes the k most significant bits of α ċ gx mod p, find α modulo p. Our solution can be used to show the hardness of MSB'S in other schemes such s ElGamal's public key system, Shamir's message passing scheme and Okamoto's conference key sharing scheme. Our results lead us to suggest a new variant of Diffie-Hellman key exchange (and other systems), for which we prove the most significant bit is hard to compute.