Browse > Article
http://dx.doi.org/10.4134/BKMS.2009.46.2.245

ANALYSIS OF THE STRONG INSTANCE FOR THE VECTOR DECOMPOSITION PROBLEM  

Kwon, Sae-Ran (DEPARTMENT OF COMPUTER SCIENCE DAELIM UNIVERSITY COLLEGE)
Lee, Hyang-Sook (DEPARTMENT OF MATHEMATICS EWHA WOMANS UNIVERSITY)
Publication Information
Bulletin of the Korean Mathematical Society / v.46, no.2, 2009 , pp. 245-253 More about this Journal
Abstract
A new hard problem called the vector decomposition problem (VDP) was recently proposed by Yoshida et al., and it was asserted that the VDP is at least as hard as the computational Diffie-Hellman problem (CDHP) under certain conditions. Kwon and Lee showed that the VDP can be solved in polynomial time in the length of the input for a certain basis even if it satisfies Yoshida's conditions. Extending our previous result, we provide the general condition of the weak instance for the VDP in this paper. However, when the VDP is practically used in cryptographic protocols, a basis of the vector space ${\nu}$ is randomly chosen and publicly known assuming that the VDP with respect to the given basis is hard for a random vector. Thus we suggest the type of strong bases on which the VDP can serve as an intractable problem in cryptographic protocols, and prove that the VDP with respect to such bases is difficult for any random vector in ${\nu}$.
Keywords
vector decomposition problem; strong instance; computational Difffie-Hellman problem;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
Times Cited By Web Of Science : 1  (Related Records In Web of Science)
Times Cited By SCOPUS : 1
연도 인용수 순위
1 I. Duursma and N. Kiyavash, On the vector decomposition problem for m-torsion points on an elliptic curve, Proc. IEEE International Symposium on Information Theory (ISIT) 27 (2004), 545–545
2 I. Duursma and N. Kiyavash, The vector decomposition problem for elliptic and hyperelliptic curves, J. Ramanujan Math. Soc. 20 (2005), no. 1, 59–76
3 I. Duursma and S. K. Park, ElGamal type signature schemes for n-dimensional vector spaces, Cryptology ePrint Archive, Report 2006/312
4 S. Kwon and H.-S. Lee, Analysis for the difficulty of the vector decomposition problem, Journal of KIISC 17 (2007), no. 3, 27–33
5 G. Frey and H. Ruck, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Math. Comp. 62 (1994), no. 206, 865–874
6 M. Yoshida, S. Mitsunari, and T. Fujiwara, Vector decomposition problem and the trapdoor inseparable multiplex transmission scheme based the problem, Proc. of the 2003 Symposium on Cryptography and Information Security (SCIS), 2003
7 A. Menezes, T. Okamoto, and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory 39 (1993), no. 5, 1639–1646   DOI   ScienceOn
8 M. Yoshida, Inseparable multiplex transmission using the pairing on elliptic curves and its application to watermarking, Proc. Fifth Conference on Algebraic Geometry, Number Theory, Coding Theory and Cryptography, University of Tokyo, 2003. Available from: http://www.math.uiuc.edu/$\sim$duursma/pub/yoshida paper.pdf