The sampling twice technique for the RSA-Based cryptosystems with anonymity

  • Authors:
  • Ryotaro Hayashi;Keisuke Tanaka

  • Affiliations:
  • Dept. of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo, Japan;Dept. of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo, Japan

  • Venue:
  • PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We say that an encryption scheme or a signature scheme provides anonymity when it is infeasible to determine which user generated a ciphertext or a signature. To construct the schemes with anonymity, it is necessary that the space of ciphertexts or signatures is common to each user. In this paper, we focus on the techniques which can be used to obtain this anonymity property, and propose a new technique for obtaining the anonymity property on RSA-based cryptosystem, which we call “sampling twice.” It generates the uniform distribution over 2k by sampling the two elements from ${\mathbb Z}_N$ where |N| = k. Then, by applying the sampling twice technique, we construct the schemes for encryption, undeniable and confirmer signature, and ring signature, which have some advantage to the previous schemes.