Welcome to the community hub built on top of the Computational Diffie–Hellman assumption Wikipedia article.
Here, you can discuss, collect, and organize anything related to Computational Diffie–Hellman assumption. The
...
one could efficiently compute in the following way:
compute by taking the discrete log of to base ;
compute by exponentiation: ;
Computing the discrete logarithm is the only known method for solving the CDH problem. But there is no proof that it is, in fact, the only method. It is an open problem to determine whether the discrete log assumption is equivalent to the CDH assumption, though in certain special cases this can be shown to be the case.[3][4]
The CDH assumption is a weaker assumption than the Decisional Diffie–Hellman assumption (DDH assumption). If computing from was easy (CDH problem), then one could solve the DDH problem trivially.
Many cryptographic schemes that are constructed from the CDH problem rely in fact on the hardness of the DDH problem. The semantic security of the Diffie–Hellman key exchange as well as the security of the ElGamal encryption rely on the hardness of the DDH problem.
There are concrete constructions of groups where the stronger DDH assumption does not hold but the weaker CDH assumption still seems to be a reasonable hypothesis.[5]
Variations of the Computational Diffie–Hellman assumption