The hardness of Hensel lifting: The case of RSA and discrete logarithm

被引:0
作者
Catalano, D [1 ]
Nguyen, PQ [1 ]
Stern, J [1 ]
机构
[1] Ecole Normale Super, Dept Informat, F-75230 Paris 05, France
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS | 2002年 / 2501卷
关键词
public-key; RSA; Paillier; discrete logarithm; Hensel; one-wayness; lattice;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At ACM CCS '01, Catalano et, al. proposed a mix of the RSA cryptosystem with the Paillier cryptosystem from Eurocrypt '99. The resulting scheme, which we call RSAP, is a probabilistic cryptosystem which is both semantically secure under an appropriate decisional assumption and as efficient a's RSA, but without the homomorphic property of the Paillier scheme. Interestingly, Sakurai and Takagi presented at PKC '02 a proof that the one-wayness of RSAP was equivalent to the RSA assumption. However, we notice in this paper that the above proof is not completely correct (it works only in the case when a perfect oracle - i.e. an oracle that always provides correct answers - is given). We fix the proof by presenting a new proof based on low-dimensional lattices. The new proof, inspired by the work of Sakurai and Takagi, is somewhat related to Hensel lifting and the N-adic decomposition of integer exponentiation. Roughly speaking, we consider the problem of computing f(x) mod M-l given f(x) mod M and an exponent l > 1. By studying the case f (x) = x(e) and M is an RSA-modulus, we deduce that the one-wayness of RSAP is indeed equivalent to the RSA assumption, and we are led to conjecture that the one-wayness of the original Paillier scheme may not be equivalent to the RSA assumption with exponent N. By analogy, we also study the discrete logarithm case, namely when f (x) = g(x) and M is a prime, and we show that the corresponding problem is curiously equivalent to the discrete logarithm problem in the subgroup spanned by g.
引用
收藏
页码:299 / 310
页数:12
相关论文
共 13 条
[1]  
[Anonymous], 1993, GEOMETRIC ALGORITHMS
[2]  
[Anonymous], LNCS
[3]  
Bach E., 1996, ALGORITHMIC NUMBER T
[4]   HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS [J].
BLUM, M ;
MICALI, S .
SIAM JOURNAL ON COMPUTING, 1984, 13 (04) :850-864
[5]  
Catalano D, 2001, LECT NOTES COMPUT SC, V2045, P229
[6]  
CATALANO D, 2001, 8 ACM C COMP COMM SE, P206
[7]  
COHEN H, 1996, GRADUATE TEXTS MATH, V138, DOI DOI 10.1007/978-3-662-02945-9
[8]  
Damgård I, 2001, LECT NOTES COMPUT SC, V1992, P119
[9]   Stronger security proofs for RSA and Rabin bits [J].
Fischlin, R ;
Schnorr, CP .
JOURNAL OF CRYPTOLOGY, 2000, 13 (02) :221-244
[10]  
Gouvea F.Q., 1997, P ADIC NUMBERS