On the security of modular exponentiation with application to the construction of pseudorandom generators (Q1402365)

From MaRDI portal
scientific article
Language Label Description Also known as
English
On the security of modular exponentiation with application to the construction of pseudorandom generators
scientific article

    Statements

    On the security of modular exponentiation with application to the construction of pseudorandom generators (English)
    0 references
    0 references
    0 references
    27 August 2003
    0 references
    Let \(N_n\) be the set of all \(n\)-bit integers \(P\cdot Q\), where \(P\) and \(Q\) are two odd primes of equal length. Let \(P_n\) be the set or pairs \(\langle N,g\rangle\) with \(N\in N_n\) and \(g\in \mathbb{Z}^*_N\), the multiplicative group of naturals \(\leq N\) and coprime to \(N\). Let \(\langle N,g\rangle\) be a uniformly distributed (u.d.) pair in \(P_n\), \(R\) u.d. in \([0,\text{ord}_N(g))\) and \(r\) u.d. in \(\{0,1\}^{\lceil n/2\rceil}\). Then \(\text{Full}_n\) denotes the distribution \(\langle N,g,g^R \bmod N\rangle\) and \(\text{Half}_n\) the distribution \(\langle N,g,g^r \bmod N\rangle\). Assuming the intractability of factoring, the authors prove that the ensembles \(\{\text{Half}_n\}_{n\in\mathbb N}\) and \(\{\text{Full}_n\}_{n\in\mathbb N}\) are computationally indistinguishable. They also show that this result is equivalent to the result by \textit{J. Håstad}, \textit{A. W. Schrift} and \textit{A. Sharmir} [J. Comput. Syst. Sci. 47, 376--404 (1993; Zbl 0790.94013)] on the simultaneous hardness of the upper \(\lceil n/2\rceil\) bits in the exponentiation function \(f_{N,g}(x)=g^x\bmod N\) (the interested reader should also consult the footnote on p.~87). Application towards an efficient factoring-based pseudorandom generator which nearly doubles the length of its input is given. To this aim a general method on how to pick a random \(n\)-bit prime using only a linear number of random bits is also described.
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    modular exponentiation
    0 references
    discrete logarithm
    0 references
    hard-core predicate
    0 references
    simultaneous security
    0 references
    pseudorandom generator
    0 references
    factoring assumption
    0 references
    0 references