A complete and explicit security reduction algorithm for RSA-based cryptosystems

被引:0
|
作者
Kurosawa, K
Schmidt-Samoa, K
Takagi, T
机构
[1] Ibaraki Univ, Hitachi, Ibaraki 3168511, Japan
[2] Tech Univ Darmstadt, Fachbereich Informat, D-64283 Darmstadt, Germany
来源
关键词
provable security; euclidean algorithm; lattice reduction; RSA cryptosystem;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we introduce a conceptually very simple and demonstrative algorithm for finding small solutions (x,y) of ax + y = c mod N, where gcd(a, N) = 1. Our new algorithm is a variant of the Euclidian algorithm. Unlike former methods, it finds a small solution whenever such a solution exists. Further it runs in time O((log N)(3)), which is the same as the best known previous techniques, e.g. lattice-based solutions. We then apply our algorithm to RSA-OAEP and RSA-Paillier to obtain better security proofs. We believe that there will be many future applications of this algorithm in cryptography.
引用
收藏
页码:474 / 491
页数:18
相关论文
共 50 条
  • [31] An Efficient RSA-Based Remote User Authentication Scheme
    Shi, Wenbo
    Chen, Yitao
    [J]. ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2012, 15 (03): : 266 - 276
  • [32] RSA-based partially blind signature with low computation
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 385 - 389
  • [33] An Algorithm to Enhance Security in RSA
    Minni, Rohit
    Sultania, Kaushal
    Mishra, Saurabh
    Vincent, Durai Raj
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [34] RSA-based Password-Authenticated Key Exchange, revisited
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1424 - 1438
  • [35] An RSA-based Algorithm for Secure D2D-aided Multicast Delivery of Multimedia Services
    Suraci, Chiara
    Pizzi, Sara
    Molinaro, Antonella
    Iera, Antonio
    Araniti, Giuseppe
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2020,
  • [36] New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
    Phong, Le Trieu
    Kurosawa, Kaoru
    Ogata, Wakaha
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 116 - +
  • [37] An improved RSA-based access control scheme for hierarchical groups
    Cao, J
    Yao, ZA
    [J]. 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 719 - 723
  • [38] ANALYSIS OF HOMOMORPHIC PROPERTIES OF RSA-BASED CRYPTOSYSTEM FOR IMAGE SHARING
    Islam, Naveed
    Puech, William
    Hayat, Khizar
    Brouzet, Robert
    [J]. 2010 IEEE 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS (ICSP2010), VOLS I-III, 2010, : 1825 - +
  • [39] A new RSA-based proxy re-encryption scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Mao, Xianping
    [J]. Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
  • [40] Retrofitting fairness on the original RSA-based E-cash
    Xu, SH
    Yung, MT
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 51 - 68