Computational Diffie-Hellman
The Computational Diffie-Hellman (CDH) is a central assumption in cryptography. It is a natural strengthening of the DDH assumption. In other words, an adversary which can solve the CDH problem can also solve DDH in the same group.
Assumption
Informally, the CDH assumption concerns a cyclic group generation algorithm which takes as input a security parameter and outputs a succinct1 description of a cyclic group where is the group set, is a generator for the group, and is the order of the group.
\begin{algorithm}
\algname{Game}
\caption{$\Game^{\text{cdh}}_{\GrGen,\calA}(\secpar)$}
\begin{algorithmic}
\State $(\GG,g,p) \gets \GrGen(1^\secpar)$
\State $x \getsr [p]$ ; $y \getsr [p]$
\State $X \gets g^x$ ; $Y \gets g^y$
\State $\hat{Z} \gets \calA(1^\secpar, \GG, g, p X, Y)$
\Return $[\hat{Z} = g^{xy}]$
\end{algorithmic}
\end{algorithm}
We say that CDH is hard for a group generation algorithm if for all efficient
is negligible.
Known Results
- It is easy to see that if can compute , then can easily distinguish between and a random group element. This establishes that CDH is not easier than DDH.
- In the Generic Group Model, , where is the number of queries that issues — Shoup97
Variations
In the above definition, we implicitly allow to choose a random generator for the group . However, BMZ19 has explored technical differences between this model and one where is selected deterministically.
Footnotes
-
Succinct means that the tuple is at most -bits, but may be super-polynomial in ↩