Generic Group Model
The Generic Group Model (GGM) is a model for analyzing the security of group-based cryptographic assumptions. It restricts adversaries to those that cannot exploit any special properties of how group elements are represented, interacting with the group only through an oracle. The model was independently proposed by Shoup Sho97 and Maurer Mau05; the two formulations differ in important ways.
Shoup’s Formulation
Let be a cyclic group of prime order . A handle function is a random injection , which assigns each group element a unique opaque bit-string called a handle. The adversary is only ever given handles — never actual group elements — and must compute via oracle queries:
- Group operation:
- Inversion:
Equality of group elements is implicit: since is injective, two handles are equal iff the underlying elements are. An algorithm is generic (in Shoup’s sense) if it succeeds at a computational task for every choice of injection .
The key result of Shoup97 is that any generic algorithm solving DLOG, CDH, or DDH in a group of prime order must issue oracle queries. Combined with the Baby-step Giant-step algorithm, this is tight.
Maurer’s Formulation
In Maurer’s formulation, genericity is captured algebraically rather than via random encodings. A group of order is presented to the adversary via a surjective group homomorphism , where is the “label space.” The adversary sees only labels (elements of ), and queries a group operation oracle that computes . An algorithm is generic if it succeeds for every such homomorphism .
This captures a different notion of independence from the group representation, and connects more naturally to the algebraic structure of .
Comparing the Two Formulations
Jager and Schwenk JS08 argued that Shoup’s and Maurer’s formulations are equivalent for standard cyclic groups. However, Maurer, Portmann, and Zhu MPZ20 showed this is not generally true. They identify a key source of divergence: in Shoup’s model, the adversary can test equality of handles (implicitly, across all known elements at once), whereas Maurer’s label-based approach encodes equality differently. MPZ20 establish a precise hierarchy of GGM variants — parameterized by the set of available queries — and show that the two original models occupy different positions in this hierarchy.
The Structured GGM
Corrigan-Gibbs, Henzinger, and Wu CHW26 extend Shoup’s model to capture algorithms that exploit non-generic structure in a controlled way. In the structured GGM, the adversary may exploit special structure for at most a fraction of group elements while remaining fully generic on the rest. The main result is that any DLOG algorithm in a group of prime order that exploits structure on at most a fraction of elements requires time
This yields tight subexponential lower bounds applicable to index-calculus algorithms, bridging the gap between fully generic lower bounds and structured algorithm analyses.
Comparison with the AGM
The Algebraic Group Model (AGM) is a strictly weaker idealization: every generic algorithm (in Shoup’s or Maurer’s sense) satisfies the AGM’s algebraic accountability condition, but not conversely. Security proven only in the AGM does not automatically imply security in the GGM.