A complete and explicit security reduction algorithm for RSA-based cryptosystems

被引:0
|
作者
Kurosawa, K
Schmidt-Samoa, K
Takagi, T
机构
[1] Ibaraki Univ, Hitachi, Ibaraki 3168511, Japan
[2] Tech Univ Darmstadt, Fachbereich Informat, D-64283 Darmstadt, Germany
来源
关键词
provable security; euclidean algorithm; lattice reduction; RSA cryptosystem;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we introduce a conceptually very simple and demonstrative algorithm for finding small solutions (x,y) of ax + y = c mod N, where gcd(a, N) = 1. Our new algorithm is a variant of the Euclidian algorithm. Unlike former methods, it finds a small solution whenever such a solution exists. Further it runs in time O((log N)(3)), which is the same as the best known previous techniques, e.g. lattice-based solutions. We then apply our algorithm to RSA-OAEP and RSA-Paillier to obtain better security proofs. We believe that there will be many future applications of this algorithm in cryptography.
引用
收藏
页码:474 / 491
页数:18
相关论文
共 50 条
  • [1] RSA-based auto-recoverable cryptosystems
    Young, A
    Yung, M
    [J]. PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 326 - 341
  • [2] The sampling twice technique for the RSA-based cryptosystems with anonymity
    Hayashi, R
    Tanaka, K
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 216 - 233
  • [3] Some RSA-based encryption, schemes with tight security reduction
    Kurosawa, K
    Takagi, T
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 19 - 36
  • [4] Multi-objective evolutionary hardware for RSA-based cryptosystems
    Nedjah, N
    Mourelle, LD
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 503 - 507
  • [5] On the provable security of an efficient RSA-based Pseudorandom Generator
    Steinfeld, Ron
    Pieprzyk, Josef
    Wang, Huaxiong
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 194 - +
  • [6] An efficient and leakage-resilient RSA-based authenticated key exchange protocol with tight security reduction
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (02) : 474 - 490
  • [7] RSA-Based Undeniable Signatures
    Rosario Gennaro
    Tal Rabin
    Hugo Krawczyk
    [J]. Journal of Cryptology, 2000, 13 : 397 - 416
  • [8] RSA-Based Undeniable Signatures
    Rosario Gennaro
    Tal Rabin
    Hugo Krawczyk
    [J]. Journal of Cryptology, 2007, 20 (3) : 394 - 394
  • [9] The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme
    Bellare, M
    Namprempre, C
    Pointcheval, D
    Semanko, M
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2002, 2339 : 319 - 338
  • [10] Security analysis on an improvement of RSA-based password authenticated key exchange
    Wang, SH
    Bao, F
    Wang, J
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (04) : 1641 - 1646