Information Security Practice and Experience
DOI: 10.1007/978-3-540-79104-1_9
|View full text |Cite
|
Sign up to set email alerts
|

RSA Moduli with a Predetermined Portion: Techniques and Applications

Abstract: Abstract. This paper discusses methods for generating RSA moduli with a predetermined portion. Predetermining a portion enables to represent RSA moduli in a compressed way, which gives rise to reduced transmission-and storage requirements. The first method described in this paper achieves the compression rate of known methods but is fully compatible with the fastest prime generation algorithms available on constrained devices. This is useful for devising a key escrow mechanism when RSA keys are generated on-bo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…The methods describing how to generate such moduli in case of RSA are discussed in [16], [13]. Furthermore, from the sets proposed in this paper, one can also choose the primes that generate the RSA modulus to speed up a decryption of RSA by means of the Chinese Remainder Theorem (CRT).…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…The methods describing how to generate such moduli in case of RSA are discussed in [16], [13]. Furthermore, from the sets proposed in this paper, one can also choose the primes that generate the RSA modulus to speed up a decryption of RSA by means of the Chinese Remainder Theorem (CRT).…”
Section: Related Workmentioning
confidence: 98%
“…Furthermore, Lenstra discusses security issues and concludes that the resulting moduli do not seem to offer less security than regular RSA moduli. In [13], Joye enhances the method for generating RSA moduli with a predetermined portion proposed in [16].…”
Section: Related Workmentioning
confidence: 99%
“…Joye proposed a method of revealing part of the private key to the administrator [3]. A user can show the administrator our secret key without revealing it to other persons by encrypting it with the symmetric key of the administrator and embedding it in the public key.…”
Section: Related Workmentioning
confidence: 99%
“…The administrator can manage the user's public key and secret key easily without needing to hold the secret key. In addition, Joye proposed a method of shortening the public key [3]. This method uses a small seed and a one-way hash function.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, Lenstra discusses security issues and concludes that the resulting moduli do not seem to offer less security than regular RSA moduli. Joye [10] enhances the method for generating RSA moduli with a predetermined portion proposed in [12].…”
Section: Related Workmentioning
confidence: 99%