2016
DOI: 10.1109/tit.2016.2594197
|View full text |Cite
|
Sign up to set email alerts
|

Breaking RSA Generically Is Equivalent to Factoring

Abstract: Let N be a random variable distributed according to some appropriate distribution over the set of products of two primes, such that factoring N is believed to be hard. The RSA assumption states that, given an a chosen uniformly at random from Z N and an e ∈ N \ {1}, it is computationally hard to find an x ∈ Z N such that x e − a ≡ 0 (mod N ).When complexity-theoretic (relative) lower bounds for certain cryptographic problems in a general model of computation seem to elude discovery, a common practice in crypto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…If Peggy could answer, for a fixed t, two challenges c and c by r and r , respectively, so that Vic accepts, then she could compute x (and hence knows it). 1 This can be shown as follows: we have h r = t · z c and h r = t · z c and thus…”
Section: The Schnorr Protocolmentioning
confidence: 96%
See 2 more Smart Citations
“…If Peggy could answer, for a fixed t, two challenges c and c by r and r , respectively, so that Vic accepts, then she could compute x (and hence knows it). 1 This can be shown as follows: we have h r = t · z c and h r = t · z c and thus…”
Section: The Schnorr Protocolmentioning
confidence: 96%
“…For concreteness, one can think of m as being an RSA-modulus [17]. For a given exponent e (with gcd(e, ϕ(m)) = 1), breaking the RSA cryptosystem means to compute eth roots modulo m. This is considered hard and, for a generic model of computation, has been proved to be equivalent to factoring m [1]. Unlike for RSA, in our context e is considered to be prime.…”
Section: The Fiat-shamir and Guillou-quisquater Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is instructive to compare our arithmetic model to the Generic Group Model (GGM) and its extensions [48,42,41,2]. The generic group model is an idealized model, where the adversary's computation is independent of the representation of the underlying cryptographic group (or ring).…”
Section: The Generic Group Modelmentioning
confidence: 99%
“…From the point of view of the safety of the generic RSA algorithm, the primary role is played by attacks that reconstruct the secret key ( ) , n d . In this context; attacks can be grouped according to the methods used to achieve this goal: ◆ Algorithms for factorization of the RSA algorithm module ◆ Characteristics of the applied public and secret key ◆ Properties induced by the method of implementing the RSA algorithm Details can be founded in [2], [3], [4], [5], [6].…”
Section: Introductionmentioning
confidence: 99%