Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,238,378 papers from all fields of science
Search
Sign In
Create Free Account
Diffie–Hellman problem
Known as:
Diffie Hellman problem
, Decision Diffie–Hellman problem
, Diffie-Hellman protocol
Expand
The Diffie–Hellman problem (DHP) is a mathematical problem first proposed by Whitfield Diffie and Martin Hellman in the context of cryptography. The…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Computational Diffie–Hellman assumption
Cryptography
Decisional Diffie–Hellman assumption
Diffie–Hellman key exchange
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Identity-Based Encryption from the Diffie-Hellman Assumption
Nico Döttling
,
Sanjam Garg
Annual International Cryptology Conference
2017
Corpus ID: 12058778
We provide the first constructions of identity-based encryption and hierarchical identity-based encryption based on the hardness…
Expand
Highly Cited
2013
Highly Cited
2013
Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing
M. P. Rewagad
,
Hod
,
Ms.Yogita Pawar
,
M. E. Student
International Conference on Communication Systems…
2013
Corpus ID: 25634473
Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as…
Expand
Highly Cited
2009
Highly Cited
2009
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
Hai Huang
,
Z. Cao
ACM Asia Conference on Computer and…
2009
Corpus ID: 11921408
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique…
Expand
Highly Cited
2008
Highly Cited
2008
The Twin Diffie-Hellman Problem and Applications
David Cash
,
Eike Kiltz
,
V. Shoup
International Conference on the Theory and…
2008
Corpus ID: 41251780
We propose a new computational problem called the twin Diffie-Hellman problem. This problem is closely related to the usual…
Expand
Highly Cited
2005
Highly Cited
2005
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
Michel Abdalla
,
D. Pointcheval
Financial Cryptography
2005
Corpus ID: 2295388
Password-based authenticated key exchange are protocols that are designed to provide strong authentication for client-server…
Expand
2004
2004
Short Exponent Diffie-Hellman Problems
Takeshi Koshiba
,
K. Kurosawa
International Conference on Theory and Practice…
2004
Corpus ID: 945389
In this paper, we study short exponent Diffie-Hellman problems, where significantly many lower bits are zeros in the exponent. We…
Expand
Highly Cited
2004
Highly Cited
2004
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
Benoît Libert
,
J. Quisquater
International Conference on Theory and Practice…
2004
Corpus ID: 5604544
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the Diffie-Hellman problem in Gap…
Expand
Highly Cited
2004
Highly Cited
2004
Easy decision-Diffie-Hellman groups
S. Galbraith
,
V. Rotger
IACR Cryptology ePrint Archive
2004
Corpus ID: 11004738
The decision Diffie-Hellman problem (DDH) is a central computational problem in cryptography. It is known that the Weil and Tate…
Expand
Highly Cited
1999
Highly Cited
1999
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem
Michel Abdalla
,
M. Bellare
,
P. Rogaway
IACR Cryptology ePrint Archive
1999
Corpus ID: 2902623
This paper describes a Di(cid:14)e-Hellman based encryption scheme, DHAES. The scheme is as e(cid:14)cient as ElGamal encryption…
Expand
Highly Cited
1999
Highly Cited
1999
The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms
U. Maurer
,
S. Wolf
SIAM journal on computing (Print)
1999
Corpus ID: 14342533
Both uniform and nonuniform results concerning the security of the Diffie--Hellman key-exchange protocol are proved. First, it is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE