Batch RSA

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Number theoretic cryptographic algorithms are all based upon modular mul-tiplication modulo some composite or prime. Some security parameter n is set (the length of the composite or prime). Cryptographic functions such as digi-tal signature or key exchange require O(n) or O(√n) modular multiplications ([DH, RSA, R, E, GMR, FS], etc.). This paper proposes a variant of the RSA scheme which requires only polylog(n) (O(log2n)) modular multiplications per RSA operation. Inherent to the scheme is the idea of batching, i.e., performing several encryption or signature operations simultaneously. In practice, the new variant effectively performs several modular exponentiations at the cost of a single modular ex-ponentiation. This leads to a very fast RSA-like scheme whenever RSA is to be performed at some central site or when pure-RSA encryption (vs. hybrid encryption) is to be performed. An important feature of the new scheme is a practical scheme that isolates the private key from the system, irrespective of the size of the system, the number of sites, or the number of private operations that need be performed.

Original languageEnglish
Title of host publicationAdvances in Cryptology — CRYPTO 1989, Proceedings
EditorsGilles Brassard
PublisherSpringer Verlag
Pages175-185
Number of pages11
ISBN (Print)9780387973173
DOIs
StatePublished - 1990
EventConference on the Theory and Applications of Cryptology, CRYPTO 1989 - Santa Barbara, United States
Duration: 20 Aug 198924 Aug 1989

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume435 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceConference on the Theory and Applications of Cryptology, CRYPTO 1989
Country/TerritoryUnited States
CitySanta Barbara
Period20/08/8924/08/89

Fingerprint

Dive into the research topics of 'Batch RSA'. Together they form a unique fingerprint.

Cite this