On the Security of the KMOV Public Key Cryptosystem

作者: D. Bleichenbacher

DOI: 10.1007/BFB0052239

关键词:

摘要: This paper analyzes the KMOV public key cryptosystem, which is an elliptic curve based analogue to RSA. It was believed that this cryptosystem more secure against attacks without factoring such as Hastad-attack in broadcast application. Some new on are presented show converse. In particular, it shown some RSA work only when a small exponent e used can be extended KMOV, but with no restriction e. The implication of these related cryptosystems also discussed.

参考文章(20)
N. Demytko, A new elliptic curve based analogue of RSA theory and application of cryptographic techniques. pp. 40- 49 ,(1994) , 10.1007/3-540-48285-7_4
Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone, New Public-Key Schemes Based on Elliptic Curves over the Ring Zn international cryptology conference. pp. 252- 266 ,(1991) , 10.1007/3-540-46766-1_20
Tsuyoshi Takagi, Shozo Naito, The Multi-variable Modular Polynomial and Its Applications to Cryptography international symposium on algorithms and computation. pp. 386- 396 ,(1996) , 10.1007/BFB0009515
Don Coppersmith, Finding a small root of a univariate modular equation theory and application of cryptographic techniques. pp. 155- 165 ,(1996) , 10.1007/3-540-68339-9_14
Marc Joye, Jean-Jacques Quisquater, Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves international workshop on security. pp. 93- 100 ,(1996) , 10.1007/3-540-62494-5_8
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Victor S. Miller, Use of Elliptic Curves in Cryptography international cryptology conference. pp. 417- 426 ,(1985) , 10.1007/3-540-39799-X_31
H. Kuwakado, K. Koyama, Security of RSA-type cryptosystems over elliptic curves against Hastad attack Electronics Letters. ,vol. 30, pp. 1843- 1844 ,(1994) , 10.1049/EL:19941252
Neal Koblitz, Elliptic curve cryptosystems Mathematics of Computation. ,vol. 48, pp. 203- 209 ,(1987) , 10.1090/S0025-5718-1987-0866109-5