On the security of modular exponentiation with application to the construction of pseudorandom generators (Q1402365): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Set OpenAlex properties.
 
(One intermediate revision by one other user not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-002-0038-7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1979828147 / rank
 
Normal rank

Latest revision as of 22:17, 19 March 2024

scientific article
Language Label Description Also known as
English
On the security of modular exponentiation with application to the construction of pseudorandom generators
scientific article

    Statements

    On the security of modular exponentiation with application to the construction of pseudorandom generators (English)
    0 references
    0 references
    0 references
    27 August 2003
    0 references
    Let \(N_n\) be the set of all \(n\)-bit integers \(P\cdot Q\), where \(P\) and \(Q\) are two odd primes of equal length. Let \(P_n\) be the set or pairs \(\langle N,g\rangle\) with \(N\in N_n\) and \(g\in \mathbb{Z}^*_N\), the multiplicative group of naturals \(\leq N\) and coprime to \(N\). Let \(\langle N,g\rangle\) be a uniformly distributed (u.d.) pair in \(P_n\), \(R\) u.d. in \([0,\text{ord}_N(g))\) and \(r\) u.d. in \(\{0,1\}^{\lceil n/2\rceil}\). Then \(\text{Full}_n\) denotes the distribution \(\langle N,g,g^R \bmod N\rangle\) and \(\text{Half}_n\) the distribution \(\langle N,g,g^r \bmod N\rangle\). Assuming the intractability of factoring, the authors prove that the ensembles \(\{\text{Half}_n\}_{n\in\mathbb N}\) and \(\{\text{Full}_n\}_{n\in\mathbb N}\) are computationally indistinguishable. They also show that this result is equivalent to the result by \textit{J. Håstad}, \textit{A. W. Schrift} and \textit{A. Sharmir} [J. Comput. Syst. Sci. 47, 376--404 (1993; Zbl 0790.94013)] on the simultaneous hardness of the upper \(\lceil n/2\rceil\) bits in the exponentiation function \(f_{N,g}(x)=g^x\bmod N\) (the interested reader should also consult the footnote on p.~87). Application towards an efficient factoring-based pseudorandom generator which nearly doubles the length of its input is given. To this aim a general method on how to pick a random \(n\)-bit prime using only a linear number of random bits is also described.
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    modular exponentiation
    0 references
    discrete logarithm
    0 references
    hard-core predicate
    0 references
    simultaneous security
    0 references
    pseudorandom generator
    0 references
    factoring assumption
    0 references
    0 references