Toward RSA-OAEP Without Random Oracles

被引:5
|
作者
Cao, Nairen [1 ]
O'Neill, Adam [2 ]
Zaheri, Mohammad [1 ]
机构
[1] Georgetown Univ, Dept Comp Sci, Washington, DC 20057 USA
[2] Univ Massachusetts Amherst, Coll Informat & Comp Sci, Amherst, MA USA
来源
关键词
PUBLIC-KEY ENCRYPTION; DIGITAL-SIGNATURES; ZERO-KNOWLEDGE; SECURITY; HASH;
D O I
10.1007/978-3-030-45374-9_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show new partial and full instantiation results under chosen-ciphertext security for the widely implemented and standardized RSA-OAEP encryption scheme of Bellare and Rogaway (EUROCRYPT 1994) and two variants. Prior work on such instantiations either showed negative results or settled for "passive" security notions like IND-CPA. More precisely, recall that RSA-OAEP adds redundancy and randomness to a message before composing two rounds of an underlying Feistel transform, whose round functions are modeled as random oracles (ROs), with RSA. Our main results are: - Either of the two oracles (while still modeling the other as a RO) can be instantiated in RSA-OAEP under IND-CCA2 using mild standard-model assumptions on the round functions and generalizations of algebraic properties of RSA shown by Barthe, Pointcheval, and B ' aguelin (CCS 2012). The algebraic properties are only shown to hold at practical parameters for small encryption exponent (e = 3), but we argue they have value for larger e as well. - Both oracles can be instantiated simultaneously for two variants of RSA-OAEP, called "t-clear" and "s-clear" RSA-OAEP. For this we use extractability-style assumptions in the sense of Canetti and Dakdouk (TCC 2010) on the round functions, as well as novel yet plausible "XOR-type" assumptions on RSA. While admittedly strong, such assumptions may nevertheless be necessary at this point to make positive progress. In particular, our full instantiations evade impossibility results of Shoup (J. Cryptology 2002), Kiltz and Pietrzak (EUROCRYPT 2009), and Bitansky et al. (STOC 2014). Moreover, our results for s-clear RSA-OAEP yield the most efficient RSA-based encryption scheme proven IND-CCA2 in the standard model (using bold assumptions on cryptographic hashing) to date.
引用
收藏
页码:279 / 308
页数:30
相关论文
共 50 条
  • [21] Mediated certificateless signature without random oracles
    Zheng M.
    Zhang J.
    Zhang Z.
    Journal of Networks, 2011, 6 (08) : 1222 - 1229
  • [22] Certificateless Signature Scheme without Random Oracles
    Yuan, Yumin
    Li, Da
    Tian, Liwen
    Zhu, Haishan
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 31 - 40
  • [23] Hidden Credential Retrieval without Random Oracles
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    Soshi, Masakazu
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 160 - +
  • [24] Efficient Sanitizable Signatures Without Random Oracles
    Lai, Russell W. F.
    Zhang, Tao
    Chow, Sherman S. M.
    Schroeder, Dominique
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 363 - 380
  • [25] Short Group Signatures Without Random Oracles
    秦波
    伍前红
    Willy Susilo
    穆怡
    王育民
    姜正涛
    JournalofComputerScience&Technology, 2007, (06) : 805 - 821
  • [26] Short group signatures without random oracles
    Qin, Bo
    Wu, Qian-Hong
    Susilo, Willy
    Mu, Yi
    Wang, Yu-Min
    Jiang, Zheng-Tao
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (06) : 805 - 821
  • [27] Designated Verifier Signature without Random Oracles
    Liao, Yongjian
    Jia, Chenjun
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 533 - 536
  • [28] Efficient blind signatures without random oracles
    Camenisch, J
    Koprowski, M
    Warinschi, B
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 134 - 148
  • [29] Short group signature without random oracles
    Liang, Xiaohui
    Cao, Zhenfu
    Shao, Jun
    Lin, Huang
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 69 - 82
  • [30] Short Group Signatures Without Random Oracles
    Bo Qin
    Qian-Hong Wu
    Willy Susilo
    Yi Mu
    Yu-Min Wang
    Zheng-Tao Jiang
    Journal of Computer Science and Technology, 2007, 22 : 805 - 821