Regularity of Lossy RSA on Subdomains and Its Applications

作者: Mark Lewko , Adam O’Neill , Adam Smith

DOI: 10.1007/978-3-642-38348-9_4

关键词: EncryptionExponentiationConnection (algebraic framework)CryptographyMathematicsGauss sumSemantic securityPKCSTrapdoor functionDiscrete mathematics

摘要: We build on an approach of Kiltz et al. (CRYPTO ’10) and bring new techniques to bear the study how “lossiness” RSA trapdoor permutation under φ-Hiding Assumption (φA) can be used understand security classical RSA-based cryptographic systems. In particular, we show that, φA, several questions or conjectures about such systems reduced bounds regularity (the distribution primitive e-th roots unity mod N) “lossy” map (where e divides φ(N)). Specifically, this is case for: (i) showing that large consecutive runs input bits are simultaneously hardcore, (ii) widely-deployed PKCS #1 v1.5 encryption semantically secure, (iii) improving for RSA-OAEP. prove results lossy using both recent estimates Gauss sums over finite subgroups, thereby obtaining in above applications. Our deepen connection between “combinatorial” properties exponentiation \(\mathbb{Z}_\emph{N}\) constructions.

参考文章(56)
David Pointcheval, How to Encrypt Properly with RSA ,(2002)
Advances in Cryptology - CRYPTO 2010 Lecture Notes in Computer Science. ,vol. 6223, ,(2010) , 10.1007/978-3-642-14623-7
Tibor Jager, Sebastian Schinzel, Juraj Somorovsky, Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption Computer Security – ESORICS 2012. pp. 752- 769 ,(2012) , 10.1007/978-3-642-33167-1_43
Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka, Efficient Non-interactive Universally Composable String-Commitment Schemes Provable Security. pp. 3- 18 ,(2009) , 10.1007/978-3-642-04642-1_3
Jeffrey Shallit, Eric Bach, Algorithmic number theory MIT Press. ,(1996)
Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams, Secure Two-Party Computation Is Practical international conference on the theory and application of cryptology and information security. pp. 250- 267 ,(2009) , 10.1007/978-3-642-10366-7_15
Christian Schridde, Bernd Freisleben, On the Validity of the Φ-Hiding Assumption in Cryptographic Protocols international conference on the theory and application of cryptology and information security. pp. 344- 354 ,(2008) , 10.1007/978-3-540-89255-7_21
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891