An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
نویسندگان
چکیده
Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption provide (in addition to privacy of the data being encrypted) privacy of the key under which the encryption was performed. Incidentally, Rivest, Shamir, and Tauman [2] recently proposed the notion of ring signature, which allows a member of an ad hoc collection of users S to prove that a message is authenticated by a member of S without revealing which member actually produced the signature. We are concerned with an underlying primitive element common to the key-privacy encryption and the ring signature schemes, that is, families of trap-door permutations with a common domain. For a standard RSA family of trap-door permutations, even if all of the functions in a family use RSA moduli of the same size (the same number of bits), it will have domains with different sizes. In this paper, we construct an RSA family of trap-door permutations with a common domain, and propose the applications of our construction to the key-privacy encryption and ring signature schemes, which have some advantage to the previous schemes.
منابع مشابه
The Security of the
In recent years, researchers have invested a lot of eeort in trying to design suitable alternatives to the RSA signature scheme, with lower computational requirements. The idea of using polynomial equations of low degree in several unknowns, with some hidden trap-door, has been particularly attractive. One of the most noticeable attempt to push this idea forward is the Ong-Schnorr-Shamir signat...
متن کاملCryptography Sep 14 , 2006 Lecture 7 : Computational Number Theory III
However, in cryptography, we are more interested in trap-door functions, which are easy to compute and hard to invert unless given trap-door information. In this class, we will go deeper into computational number theory, in particular, the Chinese Remainder theorem, then look at operations in Z n, and finally introduce RSA and Rabin assumptions which shed lights to the design of trap-door funct...
متن کاملOn the Power of Claw-Free Permutations
The popular random-oracle-based signature schemes, such as Probabilistic Signature Scheme (PSS) and Full Domain Hash (FDH), output a signature of the form 〈 f−1(y), pub 〉 , where y somehow depends on the message signed (and pub) and f is some public trapdoor permutation (typically RSA). Interestingly, all these signature schemes can be proven asymptotically secure for an arbitrary trapdoor perm...
متن کاملSimple permutations mix even better
We study the random composition of a small family of O(n) simple permutations on {0, 1}n. Specifically we ask how many randomly selected simple permutations need be composed to yield a permutation that is close to k-wise independent. We improve on the results of Gowers [12] and Hoory et al. [13] and show that up to a polylogarithmic factor, nk compositions of random permutations from this famil...
متن کاملCertifying Trapdoor Permutations, Revisited
The modeling of trapdoor permutations has evolved over the years. Indeed, finding an appropriate abstraction that bridges between the existing candidate constructions and the needs of applications has proved to be challenging. In particular, the notions of certifying permutations (Bellare and Yung, 96), enhanced and doubly enhanced trapdoor permutations (Goldreich, 04, 08, 11, Goldreich and Rot...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004