E N D
In the RSA algorithm, we saw how the difficulty of factoring yields useful cryptosystem. There is another number theory problem, namely discrete logarithms, that has similar applications. According to Diffie, the discrete logarithm problem was suggested by Gill. The discrete logarithm problem is a major open question in public-key cryptography.
Outline • Discrete Logarithms • Computing Discrete Logs • The ElGamal Public Key Cryptosystem • Bit Commitment
2 Computing Discrete Logs 2.1 Exhaustive Search
3 The ElGamal Public Key Cryptosystem The security of the ElGamal public-key encryption scheme is relies on the intractability of the discrete logarithm problem and the Diffie-Hellman problem. The basic ElGamal encryption scheme is done by ElGamal in 1985.
4 Bit Commitment 4.1 Scenarios (1) Alice claims that she has a method to predict the outcome of football games. She wants to sell her method to Bob. Bob asks her method works by predicting the results of the games that will be played this weekend. “No way,” says Alice. “Then you will simply make your bets and not pay me. Why don’t I show you my predictions for last week’s game?”
4.2 Requirements of Bit Commitment Alice can send a bit b, which is either 0 or 1, to Bob. It require that (1) Bob cannot determine the value of the bit without Alice’s help. (2) Alice cannot change the bit once she send it. Now, for each game, Alice sends a symbol b=1 if she predicts the team will win, a symbol b=0 if she predicts it will lose. After the game has been played, Alice reveals the bit to Bob.