请输入您要查询的百科知识:

 

词条 Okamoto–Uchiyama cryptosystem
释义

  1. Scheme definition

     Key generation  Message encryption  Message decryption 

  2. How the system works

  3. Security

  4. References

The Okamoto–Uchiyama cryptosystem was discovered in 1998 by Tatsuaki Okamoto and Shigenori Uchiyama. The system works in the multiplicative group of integers modulo n, , where n is of the form p2q and p and q are large primes.

Scheme definition

Like many public key cryptosystems, this scheme works in the group . A fundamental difference of this cryptosystem is that here n is an integer of the form p2q, where p and q are large primes. This scheme is homomorphic and hence malleable.

Key generation

A public/private key pair is generated as follows:

  • Generate large primes p and q and set .
  • Choose such that .
  • Let h = gn mod n.

The public key is then (ngh) and the private key is the factors (pq).

Message encryption

To encrypt a message m, where m is taken to be an element in

  • Select at random. Set

Message decryption

If we define , then decryption becomes

How the system works

The group

.

The group has a unique subgroup of order p, call it H.

By the uniqueness of H, we must have

.

For any element x in , we have xp−1 mod p2 is in H, since p divides xp−1 − 1.

The map L should be thought of as a logarithm from the cyclic group H to the additive group , and it is easy to check that L(ab) = L(a) + L(b), and that the L is an isomorphism between these two groups. As is the case with the usual logarithm, L(x)/L(g) is, in a sense, the logarithm of x with base g.

We have

So to recover m we just need to take the logarithm with base gp−1, which is accomplished by

Security

The security of the entire message can be shown to be equivalent to factoring n. The semantic security rests on the p-subgroup assumption, which assumes that it is difficult to determine whether an element x in is in the subgroup of order p. This is very similar to the quadratic residuosity problem and the higher residuosity problem.

References

  • {{cite book |first=Tatsuaki |last=Okamoto |first2=Shigenori |last2=Uchiyama |chapter=A new public-key cryptosystem as secure as factoring |title=Advances in Cryptology — EUROCRYPT'98 |series=Lecture Notes in Computer Science |volume=1403 |location= |publisher=Springer |year=1998 |pages=308–318 |doi=10.1007/BFb0054135 }}
{{Cryptography navbox | public-key}}{{DEFAULTSORT:Okamoto-Uchiyama cryptosystem}}

1 : Public-key encryption schemes

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/23 8:28:20