JOURNAL BROWSE
Search
Advanced SearchSearch Tips
ANALYSIS OF THE STRONG INSTANCE FOR THE VECTOR DECOMPOSITION PROBLEM
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
ANALYSIS OF THE STRONG INSTANCE FOR THE VECTOR DECOMPOSITION PROBLEM
Kwon, Sae-Ran; Lee, Hyang-Sook;
  PDF(new window)
 Abstract
A new hard problem called the vector decomposition problem (VDP) was recently proposed by Yoshida et al., and it was asserted that the VDP is at least as hard as the computational Diffie-Hellman problem (CDHP) under certain conditions. Kwon and Lee showed that the VDP can be solved in polynomial time in the length of the input for a certain basis even if it satisfies Yoshida`s conditions. Extending our previous result, we provide the general condition of the weak instance for the VDP in this paper. However, when the VDP is practically used in cryptographic protocols, a basis of the vector space is randomly chosen and publicly known assuming that the VDP with respect to the given basis is hard for a random vector. Thus we suggest the type of strong bases on which the VDP can serve as an intractable problem in cryptographic protocols, and prove that the VDP with respect to such bases is difficult for any random vector in .
 Keywords
vector decomposition problem;strong instance;computational Difffie-Hellman problem;
 Language
English
 Cited by
1.
Hyperelliptic Curves for the Vector Decomposition Problem over Fields of Even Characteristic, Journal of Applied Mathematics, 2015, 2015, 1  crossref(new windwow)
 References
1.
I. Duursma and N. Kiyavash, On the vector decomposition problem for m-torsion points on an elliptic curve, Proc. IEEE International Symposium on Information Theory (ISIT) 27 (2004), 545–545

2.
I. Duursma and N. Kiyavash, The vector decomposition problem for elliptic and hyperelliptic curves, J. Ramanujan Math. Soc. 20 (2005), no. 1, 59–76

3.
I. Duursma and S. K. Park, ElGamal type signature schemes for n-dimensional vector spaces, Cryptology ePrint Archive, Report 2006/312

4.
G. Frey and H. Ruck, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Math. Comp. 62 (1994), no. 206, 865–874

5.
S. Kwon and H.-S. Lee, Analysis for the difficulty of the vector decomposition problem, Journal of KIISC 17 (2007), no. 3, 27–33

6.
A. Menezes, T. Okamoto, and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory 39 (1993), no. 5, 1639–1646 crossref(new window)

7.
M. Yoshida, Inseparable multiplex transmission using the pairing on elliptic curves and its application to watermarking, Proc. Fifth Conference on Algebraic Geometry, Number Theory, Coding Theory and Cryptography, University of Tokyo, 2003. Available from: http://www.math.uiuc.edu/$\sim$duursma/pub/yoshida paper.pdf

8.
M. Yoshida, S. Mitsunari, and T. Fujiwara, Vector decomposition problem and the trapdoor inseparable multiplex transmission scheme based the problem, Proc. of the 2003 Symposium on Cryptography and Information Security (SCIS), 2003