RSA-OAEP Is Secure under the RSA Assumption

被引:0
|
作者
Eiichiro Fujisaki
Tatsuaki Okamoto
David Pointcheval
Jacques Stern
机构
[1] NTT Labs,
[2] 1-1 Hikarino-oka,undefined
[3] Yokosuka-shi 239-0847,undefined
[4] Département d’Informatique,undefined
[5] ENS – CNRS,undefined
[6] 45 rue d’Ulm,undefined
[7] 75230 Paris Cedex 05,undefined
来源
Journal of Cryptology | 2004年 / 17卷
关键词
Public-key encryption; Provable security; RSA; OAEP;
D O I
暂无
中图分类号
学科分类号
摘要
Recently Victor Shoup noted that there is a gap in the widely believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OAEP cannot be proven secure from the one-wayness of the underlying trapdoor permutation. This paper establishes another result on the security of OAEP. It proves that OAEP offers semantic security against adaptive chosen-ciphertext attacks, in the random oracle model, under the partial-domain one-wayness of the underlying permutation. Therefore, this uses a formally stronger assumption. Nevertheless, since partial-domain one-wayness of the RSA function is equivalent to its (full-domain) onewayness, it follows that the security of RSA-OAEP can actually be proven under the sole RSA assumption, although the reduction is not tight.
引用
收藏
页码:81 / 104
页数:23
相关论文
共 50 条
  • [31] A Forward-secure Threshold Signature Scheme Based on Multiplicative Secret Sharing and Strong RSA Assumption
    Lu, Dian-jun
    Wang, Yu
    Zhang, Xiao-qin
    Ji, Lan-fen
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017), 2017, : 326 - 330
  • [32] A Fast and Secure RSA Public Key Cryptosystem
    Mohammadi, M.
    Zolghadrasli, A.
    Pourmina, M. A.
    JOURNAL OF MATHEMATICAL EXTENSION, 2020, 14 (04) : 1 - 20
  • [33] A Provably Secure Asynchronous Proactive RSA Scheme
    张瑞山
    李强
    陈克非
    Journal of Shanghai Jiaotong University(Science), 2005, (04) : 333 - 337
  • [34] Secure autonomic communication using RSA algorithm
    Chittala, Aarti
    Mummini, Preethi
    Verma, P. Suresh
    2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 76 - 79
  • [35] Deep learning to evaluate secure rsa implementations
    Carbone M.
    Conin V.
    Cornélie M.-A.
    Dassance F.
    Dufresne G.
    Dumas C.
    Prouff E.
    Venelli A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 132 - 161
  • [36] Identity Based Secure RSA Encryption System
    Jain, Meenal
    Singh, Manoj
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 429 - 437
  • [37] A-RSA: Augmented RSA
    Karakra, Abdallah
    Alsadeh, Ahmad
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1016 - 1023
  • [38] A Multi-trapdoor Commitment Scheme from the RSA Assumption
    Nishimaki, Ryo
    Fujisaki, Eiichiro
    Tanaka, Keisuke
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 182 - +
  • [39] Removing the Strong RSA Assumption from Arguments over the Integers
    Couteau, Geoffroy
    Peters, Thomas
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 321 - 350
  • [40] A Multi-Trapdoor Commitment Scheme from the RSA Assumption
    Nishimaki, Ryo
    Fujisaki, Eiichiro
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 176 - 184