330 likes | 436 Views
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. [Published in J. Stern, Ed., Advances in Cryptology- EUROCRYPT'99, vol. 1592 of Lecture Notes in Computer Science, pp. 223-238, Springer-Verlag, 1999.]. Author: Pascal Paillier Presenter: 廖俊威. Outline. Introduction
E N D
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes [Published in J. Stern, Ed., Advances in Cryptology- EUROCRYPT'99, vol. 1592 of Lecture Notes in Computer Science, pp. 223-238, Springer-Verlag, 1999.] Author: Pascal Paillier Presenter: 廖俊威
Outline • Introduction • Notation and math. assumption • Scheme 1 • Scheme 2 • Scheme 3 • Properties • Conclusion
Introduction(1/2) • 兩個主要的Trapdoor技術 • RSA • Diffie-Hellman • 提出新的技術 • Composite Residuosity • 提出新的計算性問題 • Composite Residuosity Class Problem
Introduction(2/2) • 提出3個架構在上述假設的同態加密機制(Homomophic encryption schemes), 之中包含一個新的trapdoor permutation • 滿足semantically secure, 不過, 作者沒有證明.
Notation and math. assumption (1/10) • p, q are two large primes. • n = pq [ex: 35=5*7] • Euler phi-function: ψ(n) = (p-1)(q-1)[=4*6=24] • Carmichael function: λ(n) = lcm(p-1,q-1) [=λ(35)=lcm(4,6)=12] • |Zn2*| = ψ(n2) = nψ(n) [=n2(1-1/p)(1-1/q)] • Any w∈Zn2*, • wλ = 1 mod n [612 mod 35 = 1] • wnλ = 1 mod n [635*12 mod 35 = 1]
Notation and math. assumption (2/10) • RSA[n,e] problem • Extracting e-th roots modulo n where n=pq • n-th residue modulo n2 • A number z is the n-th residue modulo n2 if there exist a number y ∈Zn2*, such that z=ynmod n2 • CR[n] problem • deciding n-th residuosity • The CR[n] problem of deciding quadratic or higher degree residuosity, it is a random-self-reducibility problem. • All of its instances are polynomially equivalent. • There exists no polynomial time distinguisher for n-th residues modulo n2, i.e. CR[n] is intractable.
Notation and math. assumption (4/10) • if order(g) = kn where k is nonzero multiple of n then εg is bijective. • Domain and Co-domain are the same order nψ(n) and the function is 1-to-1.
Notation and math. assumption (6/10) • Class[n,g] problem • computing the class function in base g. • given w∈Zn2*, compute [w]g • random-self-reducible problem • the bases g are independent
Notation and math. assumption (7/10) • Class[n] problem • composite residuosity class problem • given w∈Zn2*, g∈B, compute [w]g • Class[n] Fact[n]
Notation and math. assumption (9/10) • Class[n] RSA[n,n] • D-Class[n] problem • decisional Class[n] problem • given w∈Zn2*,g∈B, x∈Zn, decide whether x=[w]g or not
Scheme 1(1/6) • New probabilistic encryption scheme
Scheme 1 (3/6) • One-way function • Given x, to compute f(x) = y is easy. • Given y, to find x s.t. f(x) = y is hard. • One-way trapdoor • f() is a one-way function. • Given a secret s, given y, to find x s.t. f(x) = y is easy. • Trapdoor permutation • f() is a one-way trapdoor. • f() is bijective.
Scheme 1 (5/6) • Scheme 1 is one-way ⇔ the Computational composite residuosity assumption(Class[n] problem) holds. • Inverting our scheme is by the definition the composite residuosity class problem.
Scheme 1 (6/6) • Scheme 1 is semantically secure ⇔ the Decisional composite residuosity assumption(CR[n] problem) holds. • m0, m1: known messages. • c:ciphertext of either m0 or m1. • [w]g=0 iff w is the n-th residue modulo n2. • c=εg(m0,r) iff cg-m0 mod n2 is the n-th residue modulo n2. • Vice-versa.
Scheme 2(1/5) • New one-way trapdoor permutation
Scheme 2(5/5) • Digital Signatures
Scheme 3(1/4) • Cost down for decryption complexity. • Restricting the ciphertext space Zn2* to subgroup <g> of smaller order.
Scheme 3(3/4) • PDL[n,g] problem • Partial discrete logarithm problem • Given w∈<g>, compute [w]g • D-PDL[n,g] problem • Decisional partial discrete logarithm problem • Given w∈<g>, x∈Zn, decide whether [w]g=x.
Scheme 3(4/4) • Scheme 3 is one-way ⇔ PDL[n,g] is hard. • Scheme 3 is semantically secure ⇔ D-PDL[n,g] is hard.
Properties(1/3) • Random-Self-Reducibility • A good algorithm for the average case implies a good algorithm for the worst case.
Properties(2/3) • Additive Homomorphic Properties
Properties(3/3) • Self-Blinding • Any ciphertext can be publicly changed into another one without affecting the plaintext.
Conclusion(4/4) • 提出新的數論問題Class[n] • 基於composite degree residues的trapdoor的機制 • 雖然並沒有提出任何證明作者的scheme能抵抗CCA,但作者相信小小的修改Scheme 1與3就可以對抗CCA,並能透過random oracle來證明