The decisional Diffie–Hellman (DDH) assumption is a
computational hardness assumption
In computational complexity theory, a computational hardness assumption is the hypothesis that a particular problem cannot be solved efficiently (where ''efficiently'' typically means "in polynomial time"). It is not known how to prove (unconditi ...
about a certain problem involving
discrete logarithm
In mathematics, for given real numbers a and b, the logarithm \log_b(a) is a number x such that b^x=a. Analogously, in any group G, powers b^k can be defined for all integers k, and the discrete logarithm \log_b(a) is an integer k such that b^k=a ...
s in
cyclic group
In abstract algebra, a cyclic group or monogenous group is a Group (mathematics), group, denoted C_n (also frequently \Z_n or Z_n, not to be confused with the commutative ring of P-adic number, -adic numbers), that is Generating set of a group, ge ...
s. It is used as the basis to prove the security of many
cryptographic
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
protocols, most notably the
ElGamal and
Cramer–Shoup cryptosystem
The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the computatio ...
s.
Definition
Consider a (multiplicative)
cyclic group
In abstract algebra, a cyclic group or monogenous group is a Group (mathematics), group, denoted C_n (also frequently \Z_n or Z_n, not to be confused with the commutative ring of P-adic number, -adic numbers), that is Generating set of a group, ge ...
of order
, and with
generator . The DDH assumption states that, given
and
for uniformly and independently chosen
, the value
"looks like" a random element in
.
This intuitive notion can be formally stated by saying that the following two probability distributions are
computationally indistinguishable (in the
security parameter
In cryptography, a security parameter is a way of measuring of how "hard" it is for an adversary to break a cryptographic scheme. There are two main types of security parameter: ''computational'' and ''statistical'', often denoted by \kappa and ...
,
):
*
, where
and
are randomly and independently chosen from
.
*
, where
are randomly and independently chosen from
.
Triples of the first kind are often called DDH triplet or DDH tuples.
Relation to other assumptions
The DDH assumption is related to the
discrete log assumption. If it were possible to efficiently compute discrete logs in
, then the DDH assumption would not hold in
. Given
, one could efficiently decide whether
by first taking the discrete
of
, and then comparing
with
.
DDH is considered to be a stronger assumption than the discrete logarithm assumption, because there are groups for which computing discrete logs is believed to be hard (and thus the DL Assumption is believed to be true), but detecting DDH tuples is easy (and thus DDH is false). Because of this, requiring that the DDH assumption holds in a group is believed to be a more restrictive requirement than DL.
The DDH assumption is also related to the
computational Diffie–Hellman assumption
A computation is any type of arithmetic or non-arithmetic calculation that is well-defined. Common examples of computation are mathematical equation solving and the execution of computer algorithms.
Mechanical or electronic devices (or, historic ...
(CDH). If it were possible to efficiently compute
from
, then one could easily distinguish the two probability distributions above. DDH is considered to be a stronger assumption than CDH because if CDH is solved, which means we can get
, the answer to DDH will become obvious.
Other properties
The problem of detecting DDH tuples is
random self-reducible, meaning, roughly, that if it is hard for even a small fraction of inputs, it is hard for almost all inputs; if it is easy for even a small fraction of inputs, it is easy for almost all inputs.
Groups for which DDH is assumed to hold
When using a cryptographic protocol whose security depends on the DDH assumption, it is important that the protocol is implemented using groups where DDH is believed to hold:
* The subgroup
of
-th residues modulo a prime
, where
is also a large prime (also called a
Schnorr group). For the case of
, this corresponds to the group of
quadratic residue
In number theory, an integer ''q'' is a quadratic residue modulo operation, modulo ''n'' if it is Congruence relation, congruent to a Square number, perfect square modulo ''n''; that is, if there exists an integer ''x'' such that
:x^2\equiv q \pm ...
s modulo a
safe prime.
* The
quotient group
A quotient group or factor group is a mathematical group obtained by aggregating similar elements of a larger group using an equivalence relation that preserves some of the group structure (the rest of the structure is "factored out"). For ex ...
for a
safe prime , which consists of the
cosets . These cosets
can be represented by
, which implies
. Since
and
are isomorphic, and the
isomorphism
In mathematics, an isomorphism is a structure-preserving mapping or morphism between two structures of the same type that can be reversed by an inverse mapping. Two mathematical structures are isomorphic if an isomorphism exists between the ...
can be computed efficiently in both direction, DDH is equally hard in both groups.
* A prime-order
elliptic curve
In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If the ...
over the
field , where
is prime, provided
has large embedding degree.
* A
Jacobian of a
hyper-elliptic curve over the
field with a prime number of reduced divisors, where
is prime, provided the Jacobian has large embedding degree.
Importantly, the DDH assumption does not hold in the multiplicative group
, where
is prime. This is because if
is a generator of
, then the
Legendre symbol
In number theory, the Legendre symbol is a multiplicative function with values 1, −1, 0 that is a quadratic character modulo of an odd prime number ''p'': its value at a (nonzero) quadratic residue mod ''p'' is 1 and at a non-quadratic re ...
of
reveals if
is even or odd. Given
,
and
, one can thus efficiently compute and compare the least significant bit of
,
and
, respectively, which provides a probabilistic method to distinguish
from a random group element.
The DDH assumption does not hold on elliptic curves over
with small embedding degree (say, less than
), a class which includes
supersingular elliptic curves. This is because the
Weil pairing
In mathematics, the Weil pairing is a pairing (bilinear form, though with multiplicative notation) on the points of order dividing ''n'' of an elliptic curve ''E'', taking values in ''n''th roots of unity. More generally there is a similar Weil ...
or
Tate pairing can be used to solve the problem directly as follows: given
on such a curve, one can compute
and
. By the bilinearity of the pairings, the two expressions are equal if and only if
modulo the order of
. If the embedding degree is large (say around the size of
) then the DDH assumption will still hold because the pairing cannot be computed. Even if the embedding degree is small, there are some subgroups of the curve in which the DDH assumption is believed to hold.
See also
*
Diffie–Hellman problem
*
Diffie–Hellman key exchange
Diffie–Hellman (DH) key exchangeSynonyms of Diffie–Hellman key exchange include:
* Diffie–Hellman–Merkle key exchange
* Diffie–Hellman key agreement
* Diffie–Hellman key establishment
* Diffie–Hellman key negotiation
* Exponential ke ...
*
Computational hardness assumptions
*
XDH assumption
*
Decisional Linear assumption
References
*
{{DEFAULTSORT:Decisional Diffie-Hellman assumption
Computational hardness assumptions
Elliptic curve cryptography