RSA-OAEP is secure under the RSA assumption

被引:79
|
作者
Fujisaki, E
Okamoto, T
Pointcheval, D
Stern, J
机构
[1] NTT Labs, Yokosuka, Kanagawa, Japan
[2] ENS, CNRS, Dept Informat, F-75230 Paris 05, France
关键词
public-key encryption; provable security; RSA; OAEP;
D O I
10.1007/s00145-002-0204-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Victor Shoup noted that there is a gap in the widely believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OAEP cannot be proven Secure from the one-wayness of the underlying trapdoor permutation. This paper establishes another result on the security of OAEP. It proves that OAEP offers semantic security against adaptive chosen-ciphertext attacks, in the random oracle model, under the partial-domain one-wayness of the underlying permutation. Therefore, this uses a formally stronger assumption. Nevertheless, since partial-domain one-wayness of the RSA function is equivalent to its (full-domain) one-wayness, it follows that the security of RSA-OAEP can actually be proven under the sole RSA assumption, although the reduction is not tight.
引用
收藏
页码:81 / 104
页数:24
相关论文
共 50 条
  • [31] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption
    Naji, Akram A. M.
    Abu Hasan, Yahya
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264
  • [32] A Forward-secure Threshold Signature Scheme Based on Multiplicative Secret Sharing and Strong RSA Assumption
    Lu, Dian-jun
    Wang, Yu
    Zhang, Xiao-qin
    Ji, Lan-fen
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017), 2017, : 326 - 330
  • [33] A Fast and Secure RSA Public Key Cryptosystem
    Mohammadi, M.
    Zolghadrasli, A.
    Pourmina, M. A.
    JOURNAL OF MATHEMATICAL EXTENSION, 2020, 14 (04) : 1 - 20
  • [34] Secure autonomic communication using RSA algorithm
    Chittala, Aarti
    Mummini, Preethi
    Verma, P. Suresh
    2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 76 - 79
  • [35] A Provably Secure Asynchronous Proactive RSA Scheme
    张瑞山
    李强
    陈克非
    Journal of Shanghai Jiaotong University, 2005, (04) : 333 - 337
  • [36] Deep learning to evaluate secure rsa implementations
    Carbone M.
    Conin V.
    Cornélie M.-A.
    Dassance F.
    Dufresne G.
    Dumas C.
    Prouff E.
    Venelli A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 132 - 161
  • [37] Identity Based Secure RSA Encryption System
    Jain, Meenal
    Singh, Manoj
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 429 - 437
  • [38] A-RSA: Augmented RSA
    Karakra, Abdallah
    Alsadeh, Ahmad
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1016 - 1023
  • [39] A Multi-trapdoor Commitment Scheme from the RSA Assumption
    Nishimaki, Ryo
    Fujisaki, Eiichiro
    Tanaka, Keisuke
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 182 - +
  • [40] Removing the Strong RSA Assumption from Arguments over the Integers
    Couteau, Geoffroy
    Peters, Thomas
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 321 - 350