Discrete logarithm

The discrete logarithm (DLOG) assumption is used throughout cryptography. It is a natural strengthening of the CDH assumption. In other words, an adversary which can solve the DLOG problem can also solve CDH in the same group.

Assumption

Informally, the CDH assumption concerns a cyclic group and a generator . The assumption is that given any group element (where was chosen uniformly from ), it is hard to compute .

Formally, consider a family of cyclic groups . Define the DLOG-advantage of an adversary as where is the generator for and is selected uniformly at random from the set .

We say that DLOG is hard for some group family if there exists a negligible function such that for all efficient adversaries ,

Variations

In the above definition, we implicitly assume that has a fixed generator. However, BMZ19 has explored technical differences between this model and one where is selected among many random generators.

  • It is easy to see that if can compute for a random , then can compute both and from and and find easily. This establishes that DLOG is not easier than CDH.
  • In the Generic Group Model, , where is the number of queries that issues — Shoup97

Attacks

  • The Baby-step Giant-step is a generic attack which works in all groups and requires space and time with . Therefore, this is optimal in the GGM — TODO citation