On the provable security of an efficient RSA-Based pseudorandom generator

  • Authors:
  • Ron Steinfeld;Josef Pieprzyk;Huaxiong Wang

  • Affiliations:
  • Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Dept. of Computing, Macquarie University, North Ryde, Australia;Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Dept. of Computing, Macquarie University, North Ryde, Australia;Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Dept. of Computing, Macquarie University, North Ryde, Australia

  • Venue:
  • ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the attractive feature of provable pseudorandomness security assuming the hardness of the RSA inversion problem. However, despite extensive study, the most efficient provably secure RSA-based generators output asymptotically only at most O(logn) bits per multiply modulo an RSA modulus of bitlength n, and hence are too slow to be used in many practical applications. To bring theory closer to practice, we present a simple modification to the proof of security by Fischlin and Schnorr of an RSA-based PRG, which shows that one can obtain an RSA-based PRG which outputs Ω(n) bits per multiply and has provable pseudorandomness security assuming the hardness of a well-studied variant of the RSA inversion problem, where a constant fraction of the plaintext bits are given. Our result gives a positive answer to an open question posed by Gennaro (J. of Cryptology, 2005) regarding finding a PRG beating the rate O(logn) bits per multiply at the cost of a reasonable assumption on RSA inversion.