2019
DOI: 10.1093/comjnl/bxz040
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting

Abstract: We analyze the security and the efficiency of interactive protocols where a client wants to delegate the computation of an RSA signature given a public key, a public message and the secret signing exponent. We consider several protocols where the secret exponent is splitted using some algebraic decomposition. We first provide an exhaustive analysis of the delegation protocols in which the client outsources a single RSA exponentiation to the server. We then revisit the security of the protocols RSA-S1 and RSA-S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

4
1

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 37 publications
0
11
0
Order By: Relevance
“…Chevalier et al [4] provided simple constructions (essentially optimal in terms of operations in the underlying group) in groups of known prime order. For RSA-based cryptography, most proposed protocols are variants of two protocols (named RSA-S1 and RSA-S2) that were proposed by Matsumoto, Kato and Imai in 1988 [10] and analyzed by Mefenza and Vergnaud [11]. For a variable base (which is the case of interest for RSA decryption/signature), all known secure delegation protocols only improve the client efficiency by a constant factor and are thus probably not suitable for limited devices in IoT.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Chevalier et al [4] provided simple constructions (essentially optimal in terms of operations in the underlying group) in groups of known prime order. For RSA-based cryptography, most proposed protocols are variants of two protocols (named RSA-S1 and RSA-S2) that were proposed by Matsumoto, Kato and Imai in 1988 [10] and analyzed by Mefenza and Vergnaud [11]. For a variable base (which is the case of interest for RSA decryption/signature), all known secure delegation protocols only improve the client efficiency by a constant factor and are thus probably not suitable for limited devices in IoT.…”
Section: Discussionmentioning
confidence: 99%
“…Chevalier et al proved lower bounds on the efficiency for generic modular outsourcing protocols (in prime order groups) [4]. These bounds suggest that improving the protocols from [11] in unknown order groups is probably difficult.…”
Section: Discussionmentioning
confidence: 99%
“…In particular, it is interesting to propose efficient delegation protocols and to improve our lower bounds in settings where the memory complexity of the client is limited. It is also interesting to provide provably secure protocols and complexity lower bounds for exponentiation protocols in groups of unknown order (which are of interest to delegate the computation of an RSA signature) [17,32].…”
Section: Discussionmentioning
confidence: 99%
“…[23]). Recently, Mefenza and Vergnaud [19] proposed an improved lattice-based attack on RSA-S1 and a simple variant of this protocol that provides better efficiency for the same security level. They also presented the first attacks on the protocol RSA-S2.…”
Section: Group Exponentiationmentioning
confidence: 99%