On the provable security of an efficient RSA-based Pseudorandom Generator

被引:0
|
作者
Steinfeld, Ron [1 ]
Pieprzyk, Josef [1 ]
Wang, Huaxiong [1 ]
机构
[1] Macquarie Univ, Ctr Adv Comp Algorithms & Cryptog ACAC, Dept Comp, N Ryde, NSW, Australia
来源
基金
澳大利亚研究理事会;
关键词
pseudorandom generator; RSA; provable security; lattice attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the attractive feature of provable pseudorandomness security assuming the hardness of the RSA inversion problem. However, despite extensive study, the most efficient provably secure RSA-based generators output asymptotically only at most O(log n) bits per multiply modulo an RSA modulus of bitlength n, and hence are too slow to be used in many practical applications. To bring theory closer to practice, we present a simple modification to the proof of security by Fischlin and Schnorr of an RSA-based PRG, which shows that one can obtain an RSA-based PRG which outputs Omega(n) bits per multiply and has provable pseudorandomness security assuming the hardness of a well-studied variant of the RSA inversion problem, where a constant fraction of the plaintext bits are given. Our result gives a positive answer to an open question posed by Gennaro (J. of Cryptology, 2005) regarding finding a PRG beating the rate O(log n) bits per multiply at the cost of a reasonable assumption on RSA inversion.
引用
收藏
页码:194 / +
页数:3
相关论文
共 50 条
  • [1] An efficient RSA-based certificateless signature scheme
    Zhang, Jianhong
    Mao, Jane
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) : 638 - 642
  • [2] Some RSA-based encryption, schemes with tight security reduction
    Kurosawa, K
    Takagi, T
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 19 - 36
  • [3] A complete and explicit security reduction algorithm for RSA-based cryptosystems
    Kurosawa, K
    Schmidt-Samoa, K
    Takagi, T
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 474 - 491
  • [4] An Efficient RSA-Based Remote User Authentication Scheme
    Shi, Wenbo
    Chen, Yitao
    [J]. ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2012, 15 (03): : 266 - 276
  • [5] RSA-Based Undeniable Signatures
    Rosario Gennaro
    Tal Rabin
    Hugo Krawczyk
    [J]. Journal of Cryptology, 2000, 13 : 397 - 416
  • [6] An efficient and leakage-resilient RSA-based authenticated key exchange protocol with tight security reduction
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (02) : 474 - 490
  • [7] RSA-Based Undeniable Signatures
    Rosario Gennaro
    Tal Rabin
    Hugo Krawczyk
    [J]. Journal of Cryptology, 2007, 20 (3) : 394 - 394
  • [8] The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme
    Bellare, M
    Namprempre, C
    Pointcheval, D
    Semanko, M
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2002, 2339 : 319 - 338
  • [9] Security analysis on an improvement of RSA-based password authenticated key exchange
    Wang, SH
    Bao, F
    Wang, J
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (04) : 1641 - 1646
  • [10] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    [J]. DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47