Submission to IEEE P 1363 aHD { RSA : Hybrid Dependent RSAa New Public - Key Encryption

نویسنده

  • David Pointcheval
چکیده

This paper describes a new hybrid RSA-based public-key encryption scheme, the HD-RSA. It relies on the recently proposed Dependent{RSA problem, which can be proven as diicult as the original RSA problem, in some circumstances. The basic scheme, using the \one-time pad" symmetric encryption, provides a both very eecient scheme and secure relative to the sole Dependent{RSA problem. A more general proposal, by integrating symmetric encryption schemes, allows much higher rates under a very weak assumption about the symmetric scheme used. The general scheme is rst presented together with a careful study of its security relative to the Dependent{RSA problem. Then, the hardness of this new problem is discussed, namely by proving its equivalence with RSA, for well-chosen exponents. Therefore, it results that this new encryption scheme is semantically secure against any kind of attacks, namely non-adaptive and even adaptive chosen-ciphertext ones. Moreover, with a similar security as OAEP{RSA (PKCS #1 v2.0), this scheme can reach higher speed rates. Furthermore, if one compares it with the DHAES or EPOC (two other IEEE P1363a candidates for encryption), eeciency gets many times better. 3 1 Preliminaries This paper proposes a new hybrid method for encrypting messages using both the Dep-endent{RSA problem and any one-time secure symmetric encryption scheme. It is freely derived from the Eurocrypt '99 paper 23], which is added in appendix. Let us rst more formally deene the required background. For all the problems presented below, we are given a large composite RSA modulus N = pq and an exponent e relatively prime to '(N), the totient function of the modulus N. Let us deene a rst new problem called the Computational Dependent{RSA Problem (C DRSA). e mod N, where = a e mod N. Notation: We denote by Succ(A) the success probability of an adversary A in nding (a + 1) e mod N: Succ(A) = Pr a A(a e mod N) = (a + 1) e mod N]. As it has already been done with the Diie-Hellman problem 14, 8], we can deene a decisional version of this problem, which we therefore call the Decisional Dependent{ RSA Problem (D DRSA): Given a candidate to the Computational Dependent{RSA problem , is it the right solution?

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HD{RSA: Hybrid Dependent RSA a New Public-Key Encryption Scheme

This paper describes a new hybrid RSA-based public-key encryption scheme, the HD-RSA. It relies on the recently proposed Dependent{RSA problem, which can be proven as di cult as the original RSA problem, in some circumstances. The basic scheme, using the \one-time pad" symmetric encryption, provides a both very e cient scheme and secure relative to the sole Dependent{RSA problem. A more general...

متن کامل

Hd{rsa: Hybrid Dependent Rsa a New Public-key Encryption Scheme 3 Security Assessment 8 4 Advantages of These Schemes 13 Hd{rsa: Hybrid Dependent Rsa a New Public-key Encryption Scheme 1.1 the Dependent{rsa Problems Find: (a + 1)

This paper describes a new hybrid RSA-based public-key encryption scheme, the HD-RSA. It relies on the recently proposed Dependent{RSA problem, which can be proven as diicult as the original RSA problem, in some circumstances. The basic scheme, using the \one-time pad" symmetric encryption, provides a both very eecient scheme and secure relative to the sole Dependent{RSA problem. A more general...

متن کامل

A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints

Internet service has enabled digital contents to be shared faster and easier, but on the other side it raised an issue of illegal copy of the digital contents. Public key encryption schemes solve this issue partially. However, there is still a weak point that the secret key is not completely protected; that is, public key encryption schemes suffer from illegal copy of secret keys (the key-cloni...

متن کامل

NHCA: Developing New Hybrid Cryptography Algorithm for Cloud Computing Environment

The amount of transmitted data through the internet become larger and larger every day. The need of an encryption algorithm that guarantee transmitting data speedily and in a secure manner become a must. The aim of the research is to encrypt and decrypt data efficiently and effectively protect the transmitted data. This research paper presents a model for encrypting transmitted cloud data. This...

متن کامل

Meteosat Images Encryption based on AES and RSA Algorithms

Satellite image Security is playing a vital role in the field of communication system and Internet. This work is interested in securing transmission of Meteosat images on the Internet, in public or local networks. To enhance the security of Meteosat transmission in network communication, a hybrid encryption algorithm based on Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) al...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999