RSA-OAEP is secure under the RSA assumption

被引:79
|
作者
Fujisaki, E
Okamoto, T
Pointcheval, D
Stern, J
机构
[1] NTT Labs, Yokosuka, Kanagawa, Japan
[2] ENS, CNRS, Dept Informat, F-75230 Paris 05, France
关键词
public-key encryption; provable security; RSA; OAEP;
D O I
10.1007/s00145-002-0204-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Victor Shoup noted that there is a gap in the widely believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OAEP cannot be proven Secure from the one-wayness of the underlying trapdoor permutation. This paper establishes another result on the security of OAEP. It proves that OAEP offers semantic security against adaptive chosen-ciphertext attacks, in the random oracle model, under the partial-domain one-wayness of the underlying permutation. Therefore, this uses a formally stronger assumption. Nevertheless, since partial-domain one-wayness of the RSA function is equivalent to its (full-domain) one-wayness, it follows that the security of RSA-OAEP can actually be proven under the sole RSA assumption, although the reduction is not tight.
引用
收藏
页码:81 / 104
页数:24
相关论文
共 50 条
  • [21] Batch RSA
    Fiat, A
    JOURNAL OF CRYPTOLOGY, 1997, 10 (02) : 75 - 88
  • [22] Batch RSA
    Amos Fiat
    Journal of Cryptology, 1997, 10 : 75 - 88
  • [23] Certifying RSA
    Kakvi, Saqib A.
    Kiltz, Eike
    May, Alexander
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 404 - 414
  • [24] A CRT-RSA algorithm secure against hardware fault attacks
    Liu, Sining
    King, Brian
    Wang, Wei
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 51 - +
  • [25] Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"
    Vergnaud, Damien
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11) : 11327 - 11329
  • [26] An optimised homomorphic CRT-RSA algorithm for secure and efficient communication
    Abid R.
    Iwendi C.
    Javed A.R.
    Rizwan M.
    Jalil Z.
    Anajemba J.H.
    Biamba C.
    Personal and Ubiquitous Computing, 2023, 27 (3) : 1405 - 1418
  • [27] RCDSD: RSA based Cross Domain Secure Deduplication on Cloud Storage
    Mishra, Shivansh
    Singh, Surjit
    Ali, Syed Taqi
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [28] An extension of RSA_512 to RSA_1024 Core under Hardware Platform based on Montgomery Powering
    Hentabli, Wahiba
    Merazka, Fatiha
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 448 - 453
  • [29] Why one should also secure RSA public key elements
    Brier, Eric
    Chevallier-Mames, Benoit
    Ciet, Mathieu
    Clavier, Christophe
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 324 - 338
  • [30] A secure and efficient public auditing scheme using RSA algorithm for cloud storage
    Zhiyan Xu
    Libing Wu
    Muhammad Khurram Khan
    Kim-Kwang Raymond Choo
    Debiao He
    The Journal of Supercomputing, 2017, 73 : 5285 - 5309