Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
نویسنده
چکیده
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the help of a trusted dealer. The incorporated parties must agree on a suitable RSA modulus with no information revealed to them about its prime factors. Enormous number of trials must be performed before a suitable modulus is established. According to the number theory, for two `-bit primes modulus, the number of trials is in the order of O(`2). Efforts have been made to reduce the quadratic slowdown in the generation process, however, most of these protocols allow the joint generation of a multi-prime RSA modulus (an RSA modulus with at least three prime factors), which is a drift from standard. Other protocols require distributed primality tests over a shared secret modulus which is an extensive task. In this paper, we introduce a simple yet an efficient idea to allow two parties to jointly generate a two-prime RSA modulus with a running time complexity O(`). In our protocol, the distributed primality test is performed over a public modulus. Consequently, the expected running time will be reduced from several days to only few minutes. The protocol can be extended to the multiparty case. However, for clarity, in this paper, we focus on the two-party case.
منابع مشابه
Efficient Dealer-Less Threshold Sharing of Standard RSA
In [15] an efficient two-party, two-prime RSA function sharing protocol was proposed. The protocol proves efficiency over previously proposed protocols. When the sharing of standard RSA is considered, the protocol is faster than ever. In this paper, under the assumption that the adversary has eavesdropping and halting capabilities, we propose an efficient extension to the protocol of [15]. Our ...
متن کاملOptimal Resilience Proactive Public-Key Cryptosystems
We introduce new eecient techniques for sharing cryptographic functions in a distributed dynamic fashion. These techniques dynamically and securely transform a distributed function (or secret sharing) representation between tout of -l (polynomial sharing) and tout of -t (additive sharing). We call the techniques poly-to-sum and sum-to-poly, respectively. Employing these techniques, we solve a n...
متن کاملLinear code derived from the primage of quadratic function
Linear codes have been an interesting topic in both theory and practice for many years. In this paper, for an odd prime power q, we construct some class of linear code over finite field Fq with defining set be the preimage of general quadratic form function and determine the explicit complete weight enumerators of the linear codes. Our construction cover all the corresponding result with quadra...
متن کاملA Comparative S-Index in Factoring RSA Modulus via Lucas Sequences
General Lucas sequences are practically useful in cryptography. In the past quarter century, factoring large RSA modulo into its primes is one of the most important and most challenging problems in computational number theory. A factoring technique on RSA modulo is mainly hindered by the strong prime properties. The success of factoring few large RSA modulo within the last few decades has been ...
متن کاملExperimenting with Shared Generation of RSA Keys
We describe an implementation of a distributed algorithm to generate a shared RSA key. At the end of the computation, an RSA modulus N = pq is publicly known. All servers involved in the computation are convinced that N is a product of two large primes, however none of them know the factorization of N . In addition, a public encryption exponent is publicly known and each server holds a share of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 7 شماره
صفحات -
تاریخ انتشار 2008