fbpx
Wikipedia

Benaloh cryptosystem

The Benaloh Cryptosystem is an extension of the Goldwasser-Micali cryptosystem (GM) created in 1985 by Josh (Cohen) Benaloh. The main improvement of the Benaloh Cryptosystem over GM is that longer blocks of data can be encrypted at once, whereas in GM each bit is encrypted individually.[1][2][3]

Scheme Definition edit

Like many public key cryptosystems, this scheme works in the group   where n is a product of two large primes. This scheme is homomorphic and hence malleable.

Key Generation edit

Given block size r, a public/private key pair is generated as follows:

  1. Choose large primes p and q such that   and  
  2. Set  
  3. Choose   such that  .
Note: If r is composite, it was pointed out by Fousse et al. in 2011[4] that the above conditions (i.e., those stated in the original paper) are insufficient to guarantee correct decryption, i.e., to guarantee that   in all cases (as should be the case). To address this, the authors propose the following check: let   be the prime factorization of r. Choose   such that for each factor  , it is the case that  .
  1. Set  

The public key is then  , and the private key is  .

Message Encryption edit

To encrypt message  :

  1. Choose a random  
  2. Set  

Message Decryption edit

To decrypt a ciphertext  :

  1. Compute  
  2. Output  , i.e., find m such that  

To understand decryption, first notice that for any   and   we have:

 

To recover m from a, we take the discrete log of a base x. If r is small, we can recover m by an exhaustive search, i.e. checking if   for all  . For larger values of r, the Baby-step giant-step algorithm can be used to recover m in   time and space.

Security edit

The security of this scheme rests on the Higher residuosity problem, specifically, given z,r and n where the factorization of n is unknown, it is computationally infeasible to determine whether z is an rth residue mod n, i.e. if there exists an x such that  .

References edit

  1. ^ Cohen, Josh; Ficsher, Michael (1985). A Robust and Verifiable Cryptographically Secure Election Scheme (PDF). Proceedings of 26th IEEE Symposium on Foundations of Computer Science. pp. 372–382.
  2. ^ Benaloh, Josh (1987). Verifiable Secret-Ballot Elections (Ph.D. thesis) (PDF).
  3. ^ Benaloh, Josh (1994). Dense Probabilistic Encryption (PDF). Workshop on Selected Areas of Cryptography. pp. 120–128.
  4. ^ Fousse, Laurent; Lafourcade, Pascal; Alnuaimi, Mohamed (2011). "Benaloh's Dense Probabilistic Encryption Revisited". arXiv:1008.2991 [cs.CR].

benaloh, cryptosystem, benaloh, cryptosystem, extension, goldwasser, micali, cryptosystem, created, 1985, josh, cohen, benaloh, main, improvement, benaloh, cryptosystem, over, that, longer, blocks, data, encrypted, once, whereas, each, encrypted, individually,. The Benaloh Cryptosystem is an extension of the Goldwasser Micali cryptosystem GM created in 1985 by Josh Cohen Benaloh The main improvement of the Benaloh Cryptosystem over GM is that longer blocks of data can be encrypted at once whereas in GM each bit is encrypted individually 1 2 3 Contents 1 Scheme Definition 1 1 Key Generation 1 2 Message Encryption 1 3 Message Decryption 1 4 Security 2 ReferencesScheme Definition editLike many public key cryptosystems this scheme works in the group Z n Z displaystyle mathbb Z n mathbb Z nbsp where n is a product of two large primes This scheme is homomorphic and hence malleable Key Generation edit Given block size r a public private key pair is generated as follows Choose large primes p and q such that r p 1 gcd r p 1 r 1 displaystyle r vert p 1 operatorname gcd r p 1 r 1 nbsp and gcd r q 1 1 displaystyle operatorname gcd r q 1 1 nbsp Set n p q ϕ p 1 q 1 displaystyle n pq phi p 1 q 1 nbsp Choose y Z n displaystyle y in mathbb Z n nbsp such that y ϕ r 1 mod n displaystyle y phi r not equiv 1 mod n nbsp Note If r is composite it was pointed out by Fousse et al in 2011 4 that the above conditions i e those stated in the original paper are insufficient to guarantee correct decryption i e to guarantee that D E m m displaystyle D E m m nbsp in all cases as should be the case To address this the authors propose the following check let r p 1 p 2 p k displaystyle r p 1 p 2 dots p k nbsp be the prime factorization of r Choose y Z n displaystyle y in mathbb Z n nbsp such that for each factor p i displaystyle p i nbsp it is the case that y ϕ p i 1 mod n displaystyle y phi p i neq 1 mod n nbsp dd Set x y ϕ r mod n displaystyle x y phi r mod n nbsp The public key is then y n displaystyle y n nbsp and the private key is ϕ x displaystyle phi x nbsp Message Encryption edit To encrypt message m Z r displaystyle m in mathbb Z r nbsp Choose a random u Z n displaystyle u in mathbb Z n nbsp Set E r m y m u r mod n displaystyle E r m y m u r mod n nbsp Message Decryption edit To decrypt a ciphertext c Z n displaystyle c in mathbb Z n nbsp Compute a c ϕ r mod n displaystyle a c phi r mod n nbsp Output m log x a displaystyle m log x a nbsp i e find m such that x m a mod n displaystyle x m equiv a mod n nbsp To understand decryption first notice that for any m Z r displaystyle m in mathbb Z r nbsp and u Z n displaystyle u in mathbb Z n nbsp we have a c ϕ r y m u r ϕ r y m ϕ r u r ϕ r y ϕ r m u ϕ x m u 0 x m mod n displaystyle a c phi r equiv y m u r phi r equiv y m phi r u r phi r equiv y phi r m u phi equiv x m u 0 equiv x m mod n nbsp To recover m from a we take the discrete log of a base x If r is small we can recover m by an exhaustive search i e checking if x i a mod n displaystyle x i equiv a mod n nbsp for all 0 r 1 displaystyle 0 dots r 1 nbsp For larger values of r the Baby step giant step algorithm can be used to recover m in O r displaystyle O sqrt r nbsp time and space Security edit The security of this scheme rests on the Higher residuosity problem specifically given z r and n where the factorization of n is unknown it is computationally infeasible to determine whether z is an rth residue mod n i e if there exists an x such that z x r mod n displaystyle z equiv x r mod n nbsp References edit Cohen Josh Ficsher Michael 1985 A Robust and Verifiable Cryptographically Secure Election Scheme PDF Proceedings of 26th IEEE Symposium on Foundations of Computer Science pp 372 382 Benaloh Josh 1987 Verifiable Secret Ballot Elections Ph D thesis PDF Benaloh Josh 1994 Dense Probabilistic Encryption PDF Workshop on Selected Areas of Cryptography pp 120 128 Fousse Laurent Lafourcade Pascal Alnuaimi Mohamed 2011 Benaloh s Dense Probabilistic Encryption Revisited arXiv 1008 2991 cs CR Retrieved from https en wikipedia org w index php title Benaloh cryptosystem amp oldid 977527848, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.