RSA public key validation

被引:0
|
作者
Silverman, RD [1 ]
机构
[1] RSA Labs, Bedford, MA 01730 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With increasing demands for internet security, the demand for distribution of public key certificates and certificate authorities spreads. This brings up the new problem of public key validation. This problem can arise in different contexts and can be adressed in some of them using novel zero knowledge protocols, while in other contexts it can be only poorly solved. The purpose of this paper is to give an overview of the topic of key validation and to discuss the possible solutions to the different instances in which it appears. We also present a new zero knowledge protocol for correctness of an RSA public exponent and a simple protocol (not zero-knowledge) for primality of a discrete logarithm. We use the latter to give a proof protocol (not zero knowledge) that an RSA key is the product of strong primes.
引用
收藏
页码:369 / 378
页数:10
相关论文
共 50 条
  • [41] New probabilistic public-key encryption based on the RSA cryptosystem
    Roman'kov, Vitalii A.
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2015, 7 (02) : 153 - 156
  • [42] An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA)
    Imam R.
    Anwer F.
    Nadeem M.
    [J]. International Journal of Information Technology, 2022, 14 (5) : 2645 - 2656
  • [43] Magnifying the Key Stability of RSA Algorithm in Data Security for Public Cloud
    Kamal, M.
    Ravi, G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 805 - 812
  • [44] On the conventional public key in identification-based encryption: The case of RSA
    Aouinatou, Rkia
    Belkasmi, Mostafa
    [J]. International Journal of Information and Computer Security, 2013, 5 (03) : 171 - 201
  • [45] New public key cryptosystems based on the Dependent-RSA Problems
    Pointcheval, D
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 239 - 254
  • [46] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    [J]. DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [47] Why one should also secure RSA public key elements
    Brier, Eric
    Chevallier-Mames, Benoit
    Ciet, Mathieu
    Clavier, Christophe
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 324 - 338
  • [48] A faster modular multiplication based on key size partitioning for RSA public-key cryptosystem
    Lee, SY
    Jeong, YJ
    Kwon, OJ
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2002, E85D (04) : 789 - 791
  • [49] Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm
    Zhao, Tieyu
    Ran, Qiwen
    Yuan, Lin
    Chi, Yingying
    Ma, Jing
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [50] Enhanced RSA Algorithm using Fake Modulus and Fake Public Key Exponent
    Raghunandhan, K. R.
    Shetty, Surendra
    Aithal, Ganesh
    Rakshith, N.
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT - 2018), 2018, : 755 - 759