2000
DOI: 10.1007/3-540-44495-5_25
|View full text |Cite
|
Sign up to set email alerts
|

A Generalized Takagi-Cryptosystem with a Modulus of the Form prqs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 3 publications
0
20
0
Order By: Relevance
“…In that case the condition for polynomial-time factorization becomes r = Ω(log Q) = Ω(log p), the same condition as BDH. This shows that N = p r+1 q r can also be factored in polynomial time for large r. We note that in [LKYL00] only moduli of the form N = p r+1 q r were considered for lattice-based factorisation.…”
Section: Introductionmentioning
confidence: 88%
See 2 more Smart Citations
“…In that case the condition for polynomial-time factorization becomes r = Ω(log Q) = Ω(log p), the same condition as BDH. This shows that N = p r+1 q r can also be factored in polynomial time for large r. We note that in [LKYL00] only moduli of the form N = p r+1 q r were considered for lattice-based factorisation.…”
Section: Introductionmentioning
confidence: 88%
“…In light of the BDH attack, Takagi's cryptosystem was later extended by Lim et al in [LKYL00] to moduli of the form N = p r q s . Namely the authors describe a public-key cryptosystem with modulus N = p r q s , and obtain even faster decryption than in Takagi's cryptosystem.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…About at the same time Takagi [5] proposed an even faster solution using the modulus N = p r q, for which the exponentiation modulo p r is computed using the Hensel lifting method [6, p.137]. Later, this solution has been generalized to the modulus N = p r q s [7]. According to [3] the appropriate number of primes to be chosen in order to resist state-of-the-art factorization algorithms depends from the modulus size, and, precisely, it can be: up to 3 primes for 1024, 1536, 2048, 2560, 3072, and 3584 bit modulus, up to 4 for 4096, and up to 5 for 8192.…”
Section: Multifactor Rsamentioning
confidence: 99%
“…In order to gain a faster decryption, Takagi [27] variant of RSA with a modulus n = p r q. For similar reasons, Lim et al [17] presented a variant of RSA and Takagi schemes with a modulus n = p r q s . Such variants are used in cryptography for various applications such as electronic cash [6] and the design of Okamoto-Uchiyama scheme [22].…”
Section: Introductionmentioning
confidence: 97%