2017
DOI: 10.1007/978-3-319-66402-6_13
|View full text |Cite
|
Sign up to set email alerts
|

Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…For example, in the well-known public key cryptosystem, invented by Rivest, Shamir and Adleman (RSA), the need for selection of prime numbers is fundamental, and the selection of prime numbers in many ways determines the strength of the encryption [100]. Recently Benhamouda et al study new type of general-purpose compact non-interactive proofs, called attestations, which allow to confirm that n was a properly generated prime number [101].…”
Section: Methods For Generating Prime Numbers For Datamentioning
confidence: 99%
“…For example, in the well-known public key cryptosystem, invented by Rivest, Shamir and Adleman (RSA), the need for selection of prime numbers is fundamental, and the selection of prime numbers in many ways determines the strength of the encryption [100]. Recently Benhamouda et al study new type of general-purpose compact non-interactive proofs, called attestations, which allow to confirm that n was a properly generated prime number [101].…”
Section: Methods For Generating Prime Numbers For Datamentioning
confidence: 99%
“…Proofs of Correct Form of Moduli. An orthogonal to the above line of work intends to prove that the group itself is not subverted [3,10,19,41,42,61], meaning that the modulus N of the RSA group has some beneficial property; for example is square-free, a product of two primes, a product of equally-sized primes, a Blum integer or a product of two safe primes, etc. Other works consider proving that moduli are correctly formed in the context of specific applications as password-based key agreement [23] or threshold ECDSA signatures [21].…”
Section: Proofs Over Groups Of Unknownmentioning
confidence: 99%
“…The DV Prot protocol is knowledgesound in the designated verifier model, provided that the AHE is IND-CPA secure. 10 Proof. Suppose that (vpk, vsk, τ) $ ← − KeyGen(1 λ ), where τ = {c 1 , .…”
Section: Theorem 1 (Knowledge Soundness)mentioning
confidence: 99%
“…Wong, Chan, and Zhu [WCZ03, Section 3.2] and Catalano, Pointcheval, and Pornin [CPP07, Appendix D.2] present interactive protocols (using techniques similar to ours) that, like the protocols of [AP18], also work only over Z * N rather than the entire Z N . The protocols given by Camenisch and Michels [CM99, Section 5.2] and Benhamouda et al [BFGN17] achieve much stronger goals. The former proves N = pq is a product of two safe primes (i.e., p, q, (p−1)/2, and (q−1)/2 are all prime); the second can prove that any prespecified procedure for generating the primes p and q was followed.…”
Section: Related Workmentioning
confidence: 99%
“…The former proves N = pq is a product of two safe primes (i.e., p, q, (p−1)/2, and (q−1)/2 are all prime); the second can prove that any prespecified procedure for generating the primes p and q was followed. These protocols can be used to prove that (N, e) specifies a permutation by imposing mild additional conditions on e (and the prime generation procedure for [BFGN17]). However, these stronger goals are not necessary for our purposes.…”
Section: Related Workmentioning
confidence: 99%