How to Use RSA; or How to Improve the Efficiency of RSA Without Loosing its Security

نویسندگان

  • Marc Joye
  • Pascal Paillier
چکیده

It is striking to observe the progressive explosion of RSA key lengths. Although this trend clearly corresponds to a (legitimate) ever-increasing need for a guaranteed security level, this paper considers alternative, more efficient, secure implementations of RSA with respect to industrial constraints.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RSA hybrid encryption schemes

This document compares the two published RSA-based hybrid encryption schemes having linear reduction in their security proof: RSA-KEM with DEM1 and RSA-REACT. While the performance of RSA-REACT is worse than the performance of RSA-KEM+DEM1, a complete proof of its security has already been published. This is indeed an advantage, because we show that the security result for RSAKEM+DEM1 has a sma...

متن کامل

Unprovable Security of RSA-OAEP in the Standard Model

Consider the provable security of RSA-OAEP when not instantiated with random oracles. Suppose a security reduction exists to show that finding a plaintext from a RSA-OAEP ciphertext (breaking the basic OW-CPA security) is as hard as the RSA problem. • The reduction can be used in an adaptive chosen ciphertext text (IND-CCA2) attack against RSA-OAEP. • The reduction cannot succeed in the random ...

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key

The efficiency of decryption process of Multi prime RSA, in which the modulus contains more than two primes, can be speeded up using Chinese remainder theorem (CRT). On the other hand, to achieve the same level of security in terms integer factorization problem the length of RSA modulus must be larger than the traditional RSA case. In [9], authors studied the RSA public key cryptosystem in a sp...

متن کامل

P-157: TLR5 Gene Expression in Endometrium of Women with Unexplained Recurrent Spontaneous Abortion

Background: Recurrent spontaneous abortion (RSA) is usually defined as three or more consecutive pregnancy losses before 20th week of gestation. Although different factors are considered as etiology of RSA but in some cases, despite of extensive work up, the cause of RSA remains unknown which called unexplained RSA. Immunological factors are suggested as etiological factors of unexplained RSA. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002