Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.3.27

Analysis for the difficulty of the vector decomposition problem  

Kwon, Sae-Ran (Daelim College)
Lee, Hyang-Sook (Ewha Womans University)
Abstract
Recently, a new hard problem on a two dimensional vector space called vector decomposition problem (VDP) was proposed by M. Yoshida et al. and proved that it is at least as hard as the computational Diffe-Hellman problem (CDHP) on a one dimensional subspace under certain conditions. However, in this paper we present the VDP relative to a specific basis can be solved in polynomial time although the conditions proposed by M. Yoshida on the vector space are satisfied. We also suggest strong instances based on a certain type basis which make the VDP difficult for any random vector relative to the basis. Therefore, we need to choose the basis carefully so that the VDP can serve as the underlying intractable problem in the cryptographic protocols.
Keywords
Vector Decomposition Problem; Weak Instances; Strong Instances; Computational Diffie-Hellman Problem;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Boneh and M. Franklin, 'Identity-based encryption from the Weil pairing', Proc. of Advances in Cryptology, Crypto 2001, LNCS 2139, pp. 213-229, 2001
2 I. Duursma and N. Kiyavash, 'The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves', J. Ramanujan Math. Soc., 20, No. 1, pp. 59-76, 2005
3 N. Kiyavash and I. Duursma, 'On the vector decomposition problem for m-torsion points on an elliptic curve', Proc of IEEE International Symposium on Information Theory (ISIT), 27, pp. 545-545, 2004
4 M. Yoshida, S. Mitsunari, and T. Fujiwara, 'Vector decomposition problem and the trapdoor inseparablemultiplex transmission scheme based the problem', Proc. of the 2003 Symposium on Cryptography and Information Security (SCIS), 7B-1, 2003
5 M.Yoshida, 'Inseparable multiplex transmission using the pairing on elliptic curves and its application to watermarking', Proc. Fifth Conference on Algebraic Geometry, Number Theory, Coding Theory and Cryptography, University of Tokyo, 2003. Available from: http://www.math.uiuc.edu/-duursma/pub/yoshida_paper.pdf