### Corrections chap-structures

master
parent 71e9abec4c
commit efde1d281b
3 changed files with 52 additions and 54 deletions

#### 14 chap-structures.tex View File

 @ -1,16 +1,16 @@ In the previous chapter, we saw that theoretical cryptography has to rely on \emph{computational hardness assumptions}. Beside \emph{information theory-base cryptography}, most hardness assumptions are built on top of algebraic structures. In the previous chapter, we saw that cryptography has to rely on \emph{computational hardness assumptions}. Besides \emph{information-theoretic cryptography}, most hardness assumptions are built on top of suitable algebraic structures. For instance the discrete logarithm assumption (Definition~\ref{de:DLP}) is based on a cyclic group structure. That is, in some groups it is assumed that computing the discrete logarithm is an intractable problem for any probabilistic polynomial time algorithms. %That is, in some groups it is assumed that computing the discrete logarithm is an intractable problem for any probabilistic polynomial time algorithms.   The existence of these structures proves useful when it comes to design protocols. For that, constructions takes advantage of the mathematical properties of the structure to allow the functionality. An example is the multiplicative homomorphism of the ElGamal cryptosystem which is possible using the structure of the underlying cyclic group $\GG$ on which the scheme is built upon. The existence of such structures proves useful when it comes to designing protocols. For this purpose, constructions take advantage of the mathematical properties of the structure to enable the functionality. An example is the multiplicative homomorphism of the ElGamal cryptosystem which is made possible by underlying cyclic group structure. %Namely, an El Gamal encryption of a message $M$ under the public key $h = g^\alpha_{} \in \GG$ is a couple $(c_1^{}, c_2^{}) = (g^r_{}, M \cdot h^r_{}) \in \GG^2_{}$, which can be decrypted with the knowledge of the secret key $\alpha \in \Zp$: $M = c_2^{} \cdot c_1^{-\alpha}$. %Then, the cyclic group structure of $\GG$ leads to the ability to compute a valid ciphertext for $M \cdot M'$ given ciphertexts $(c_1^{}, c_2^{})$ and $(c'_1, c'_2)$ of $M$ and $M'_{}$ respectively. %The resulting ciphertext is $(c_1^{} \cdot c'_1, c_2^{} \cdot c'_2) = (g^{r \cdot r'_{}}, M \cdot M' \cdot h^{r \cdot r'_{}})$   In this chapter, we describe the different structures on which the cryptography primitives we design in this thesis are based on, namely bilinear groups and lattices, as well as related hardness assumptions. In this chapter, we describe the different structures on which the cryptographic primitives we design in this thesis are based on, namely bilinear groups and lattices, as well as related hardness assumptions.   \section{Pairing-Based Cryptography} \addcontentsline{tof}{section}{\protect\numberline{\thesection} Cryptographie à base de couplage}