CEILIDH
From Wikipedia, the free encyclopedia
CEILIDH is a public key cryptosystem based on the discrete logarithm problem in algebraic torus. This idea was first introduced by Alice Silverberg and Karl Rubin in 2003. The main advantage of those schemes is the reduced size of the keys for the same security than the basic schemes.
The name CEILIDH comes from the Scots Gaelic word ceilidh which means a traditional Scottish Gathering.
Contents |
[edit] Algorithms
[edit] Parameters
- Let q be a prime power.
- An integer n is chosen such that :
- The torus Tn has an explicit rational parametrization.
- Φn(q) is divisible by a big prime l where Φn is the nth Cyclotomic polynomial.
- Let m = φ(n) where φ is the Euler function.
- Let
a birational map and its inverse ψ. - Choose
of order l and let g = ρ(α)).
[edit] Key agreement scheme
This Scheme is based on the Diffie-Hellman key agreement.
- Alice choses a random number
. - She computes
and sends it to Bob.
- Bob choses a random number
. - He computes
and sends it to Alice.
- Alice computes

- Bob computes

ψoφ is the identity, thus we have : ρ(ψ(PB))a) = ρ(ψ(PA))b) = ρ(ψ(g)ab) which is the shared secret of Alice and Bob.
[edit] Encryption scheme
This scheme is based on the ElGamal encryption.
- Key Generation
- Alice choses a random number
as her private key. - The resulting public key is
.
- Alice choses a random number
- Encryption
- The message M is an element of
. - Bob choses a random integer k in the range
. - Bob computes
and
. - Bob sends the ciphertext (γ,δ) to Alice.
- The message M is an element of
- Decryption
- Alice computes M = ρ(ψ(δ)ψ(γ) − a).
[edit] Security
CEILIDH scheme is base on ElGamal scheme and thus is based on the same security properties.
If the computational Diffie-Hellman assumption holds the underlying cyclic group G, then the encryption function is one-way[1].
If the decisional Diffie-Hellman assumption (DDH) holds in G, then CEILIDH achieves semantic security.[1] Semantic security is not implied by the computational Diffie-Hellman assumption alone[2]. See decisional Diffie-Hellman assumption for a discussion of groups where the assumption is believed to hold.
CEILIDH encryption is unconditionally malleable, and therefore is not secure under chosen ciphertext attack. For example, given an encryption (c1,c2) of some (possibly unknown) message m, one can easily construct a valid encryption (c1,2c2) of the message 2m.
[edit] References
- ^ a b CRYPTUTOR, "Elgamal encryption scheme"
- ^ M. Abdalla, M. Bellare, P. Rogaway, "DHAES, An encryption scheme based on the Diffie-Hellman Problem" (Appendix A)
- Karl Rubin, Alice Silverberg: Torus-Based Cryptography. CRYPTO 2003: 349–365
[edit] External links
- Torus-Based Cryptography — the paper introducing the concept (in PDF).
|
|||||||||||||||||||||||||||||

