<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-17T02:30:14Z</responseDate><request verb="GetRecord" identifier="oai:www.recercat.cat:10230/42257" metadataPrefix="didl">https://recercat.cat/oai/request</request><GetRecord><record><header><identifier>oai:recercat.cat:10230/42257</identifier><datestamp>2025-12-24T08:59:30Z</datestamp><setSpec>com_2072_6</setSpec><setSpec>col_2072_452952</setSpec></header><metadata><d:DIDL xmlns:d="urn:mpeg:mpeg21:2002:02-DIDL-NS" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:doc="http://www.lyncode.com/xoai" xsi:schemaLocation="urn:mpeg:mpeg21:2002:02-DIDL-NS http://standards.iso.org/ittf/PubliclyAvailableStandards/MPEG-21_schema_files/did/didl.xsd">
   <d:Item id="hdl_10230_42257">
      <d:Descriptor>
         <d:Statement mimeType="application/xml; charset=utf-8">
            <dii:Identifier xmlns:dii="urn:mpeg:mpeg21:2002:01-DII-NS" xsi:schemaLocation="urn:mpeg:mpeg21:2002:01-DII-NS http://standards.iso.org/ittf/PubliclyAvailableStandards/MPEG-21_schema_files/dii/dii.xsd">urn:hdl:10230/42257</dii:Identifier>
         </d:Statement>
      </d:Descriptor>
      <d:Descriptor>
         <d:Statement mimeType="application/xml; charset=utf-8">
            <oai_dc:dc xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
               <dc:title>An algebraic framework for Diffie-Hellman assumptions</dc:title>
               <dc:creator>Escala, Alex</dc:creator>
               <dc:creator>Herold, Gottfried</dc:creator>
               <dc:creator>Kiltz, Eike</dc:creator>
               <dc:creator>Ràfols, Carla</dc:creator>
               <dc:creator>Villar, Jorge L.</dc:creator>
               <dc:subject>Diffie-Hellman assumption</dc:subject>
               <dc:subject>Generic hardness</dc:subject>
               <dc:subject>Groth-Sahai proofs</dc:subject>
               <dc:subject>Hash proof systems</dc:subject>
               <dc:subject>Public-key encryption</dc:subject>
               <dc:description>Comunicació presentada a: CRYPTO 2013 The 33rd Annual Cryptology Conference, celebrada del 18 al 22 d&amp;apos;agost de 2013 a Santa Bàrbara, Califòrnia, Estats Units d&amp;apos;Amèrica.</dc:description>
               <dc:description>We put forward a new algebraic framework to generalize and analyze Di_e-Hellman like Decisional Assumptions which allows us to argue about security and applications by considering only algebraic properties. Our D`;k-MDDH assumption states that it is hard to decide whether a vector in G` is linearly dependent of the columns of some matrix in G`_k sampled according to distribution D`;k. It covers known assumptions such as DDH, 2-Lin (linear assumption), and k-Lin (the k-linear assumption). Using our algebraic viewpoint, we can relate the generic hardness of our assumptions in m-linear groups to the irreducibility of certain polynomials which describe the output of D`;k. We use the hardness results to _nd new distributions for which the D`;k-MDDH-Assumption holds generically in m-linear groups. In particular, our new assumption 2-SCasc is generically hard in bilinear groups and, compared to 2-Lin, has shorter description size, which is a relevant parameter for e_ciency in many applications. These results support using our new assumption as a natural replacement for the 2-Lin Assumption which was already used in a large number of applications. To illustrate the conceptual advantages of our algebraic framework, we construct several fundamental primitives based on any MDDH-Assumption. In particular, we can give many instantiations of a primitive in a compact way, including public-key encryption, hash-proof systems, pseudo-random functions, and Groth-Sahai NIZK and NIWI proofs. As an independent contribution we give more e_cient NIZK proofs for membership in a subgroup of G`, for validity of ciphertexts and for equality of plaintexts. The results imply very signi_cant e_ciency improvements for a large number of schemes, most notably Naor-Yung type of constructions.</dc:description>
               <dc:description>Funded by a Sofja Kovalevskaja Award of the Alexander von Humboldt Foundation and the German Federal Ministry for Education and Research. Partially supported by the Spanish Government through projects MTM2009-07694 and Consolider Ingenio 2010 CDS2007-00004 ARES.</dc:description>
               <dc:date>2019-09-10T13:32:53Z</dc:date>
               <dc:date>2019-09-10T13:32:53Z</dc:date>
               <dc:date>2013</dc:date>
               <dc:type>info:eu-repo/semantics/conferenceObject</dc:type>
               <dc:type>info:eu-repo/semantics/acceptedVersion</dc:type>
               <dc:relation>Caretti R, Garay JA, editors. Advances in Cryptology – CRYPTO 2013. 33rd Annual Cryptology Conference Proceedings, Part II; 2013 Aug 18-22; Santa Barbara, CA, USA. Berling: Springer; 2013. p. 129-47. (LNCS; no. 8043).</dc:relation>
               <dc:rights>© International Association for Cryptologic Research 2013&#xd;
The final publication is available at Springer via&#xd;
https://doi.org/10.1007/s00145-015-9220-6</dc:rights>
               <dc:rights>info:eu-repo/semantics/openAccess</dc:rights>
               <dc:publisher>Springer</dc:publisher>
            </oai_dc:dc>
         </d:Statement>
      </d:Descriptor>
   </d:Item>
</d:DIDL></metadata></record></GetRecord></OAI-PMH>