Security and Performance of Server-Aided RSA Computation Protocols

  • Authors:
  • Chae Hoon Lim;Pil Joong Lee

  • Affiliations:
  • -;-

  • Venue:
  • CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
  • Year:
  • 1995

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper investigates various security issues and provides possible improvements on server-aided RSA computation schemes, mainly focused on the two-phase protocols, RSA-SIM and RSA-S2M, proposed by Matsumoto et al. [4]. We first present new active attacks on these protocols when the final result is not checked. A server-aided protocol is then proposed in which the client can check the computed signature in at most six multiplications irrespective of the size of the public exponent. Next we consider multi-round active attacks on the protocol with correctness check and show that parameter restrictions cannot defeat such attacks. We thus assume that the secret exponent is newly decomposed in each run of the protocol and discuss some means of speeding up this preprocessing step. Finally, considering the implementation-dependent attack, we propose a new method for decomposing the secret and performing the required computation efficiently.