From Wikipedia, the free encyclopedia
Jump to: navigation, search

Articles relating to Decisional Diffie-Hellman assumption:[edit]

Decisional Diffie-Hellman assumption

  • add section on candidate groups where it is believed to hold, Green tickY
  • general clean up. Green tickY

Diffie-Hellman key exchange is in bad shape formally

  • uses everywhere,
  • stuff about prime order subgroups should really go in DDH article.
  • do we really need a zillion examples?

ElGamal encryption

  • needlessly duplicates all of the prime-order subgroup disclaimer stuff. Green tickY

ElGamal signature scheme (don't know about this scheme, but the article is very suspicious.)

  • uses everywhere
  • only mentions computational discrete log problem.

Diffie-Hellman problem and Computational Diffie-Hellman assumption:

  • be sure to maintain consistency with these guys

Cramer-Shoup cryptosystem.

  • needs separate security section
  • comments about history of CCA schemes should go in CCA article

Computational hardness assumption

  • misc TLC

what links to DDH assumption page

Encryption security definitions:[edit]

semantic security

  • needs an actual definition!

chosen ciphertext attack, adaptive chosen ciphertext attack, chosen plaintext attack

  • good god, they don't have actual definitions.
  • CCA1 and CCA2 do NOT need separate articles.

Ciphertext indistinguishability

  • what a crappy term
  • article also sucks


  • Weed out claims of "provable security" that don't mention the computational assumption (or security level achieved, i.e CCA/CPA).
  • Try to achieve some uniformity about "cryptosystem" vs "encryption scheme" vs (my least favorite) "encryption algorithm".