Batch Private Keys Generation for RSA in Security Communication Systems

被引:1
|
作者
陈运
陈新
机构
[1] School of Information Technology & Computer Science, University of Wollongong NSW 2522 Australia ,College of Information and Electrical Engineering, Zhengzhou University of Light Industry Zhengzhou 450002 China
[2] School of Communications & Information Engineering, UESTC Chengdu 610054 China
关键词
information security system; public key cryptosystem; RSA; key generation;
D O I
暂无
中图分类号
TN918.6 [保密通信:按结构原理分];
学科分类号
0839 ; 1402 ;
摘要
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.
引用
收藏
页码:22 / 26
页数:5
相关论文
共 50 条
  • [1] An evaluation of the RSA private keys and the presence of weak keys
    Almazari, Mahmoud M.
    Taqieddin, Eyad
    Shatnawi, Ahmed S.
    Al-Shara, Zakarea
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (08): : 2273 - 2284
  • [2] On the Existence of Multiple RSA Private Keys
    Wu, Chuan-Kun
    Zhao, Bin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [3] Correcting Errors in RSA Private Keys
    Henecka, Wilko
    May, Alexander
    Meurer, Alexander
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 351 - 369
  • [4] SHORT RSA KEYS AND THEIR GENERATION
    VANSTONE, SA
    ZUCCHERATO, RJ
    [J]. JOURNAL OF CRYPTOLOGY, 1995, 8 (02) : 101 - 114
  • [5] Storing RSA private keys in your head
    Krivoruchko, Taisya
    Diamond, James
    Hooper, Jeff
    [J]. 12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 129 - +
  • [6] Parallel Generation of RSA keys - A Review
    Lakkadwala, Maria
    Valiveti, Sharada
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 350 - 355
  • [7] Implementing shared generation of RSA keys
    Avdhani, P. S.
    Jagadamba, P. V. S. Lakshmi
    [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 82 - +
  • [8] Efficient generation of shared RSA keys
    Boneh, D
    Franklin, M
    [J]. JOURNAL OF THE ACM, 2001, 48 (04) : 702 - 722
  • [9] Efficient generation of shared RSA keys
    Boneh, D
    Franklin, M
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 425 - 439
  • [10] Security Analysis of an RSA Key Generation Algorithm with a Large Private Key
    Kong, Fanyu
    Yu, Jia
    Wu, Lei
    [J]. INFORMATION SECURITY, 2011, 7001 : 95 - +