×

An RSA family of trap-door permutations with a common domain and its applications. (English) Zbl 1198.94097

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 291-304 (2004).
Summary: M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval [“Key-privacy in public-key encryption”, Lect. Notes Comput. Sci. 2248, 566–582 (2001; Zbl 1064.94553)] recently proposed a new security requirement of the encryption schemes called “key-privacy.” It asks that the encryption provide (in addition to privacy of the data being encrypted) privacy of the key under which the encryption was performed. Incidentally, R. L. Rivest, A. Shamir, and Y. Tauman [“How to leak a secret”, Lect. Notes Comput. Sci. 2248, 552–565 (2001; Zbl 1064.94558)] recently proposed the notion of ring signature, which allows a member of an ad hoc collection of users \(S\) to prove that a message is authenticated by a member of \(S\) without revealing which member actually produced the signature.
We are concerned with an underlying primitive element common to the key-privacy encryption and the ring signature schemes, that is, families of trap-door permutations with a common domain. For a standard RSA family of trap-door permutations, even if all of the functions in a family use RSA moduli of the same size (the same number of bits), it will have domains with different sizes. In this paper, we construct an RSA family of trap-door permutations with a common domain, and propose the applications of our construction to the key-privacy encryption and ring signature schemes, which have some advantage to the previous schemes.
For the entire collection see [Zbl 1049.94003].

MSC:

94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
Full Text: DOI