Introduction Our main result: DDH implies (P,Q)-DDH Applications: Diffie-Hellman-based protocols A symbolic logic for Diffie-Hellman exponentials and encryption A generalization of DDH with applications to protocol analysis and computational soundness Emmanuel Bresson1, Yassine Lakhnech2, Laurent Mazare3, Bogdan Warinschi4 DCSSI Crypto Lab, VERIMAG Grenoble, Amadeus SAS, University of Bristol, July 4, 2007 ENS — June 21, 2007 A Generalization of DDH and Applications
- ddh
- generalizing ddh
- pseudo-random generators
- protocol analysis
- adversary must
- secure public-key
- make protocol
- multiple challenges
- key exchange