- Source: Benaloh cryptosystem
The Benaloh Cryptosystem is an extension of the Goldwasser-Micali cryptosystem (GM) created in 1985 by Josh (Cohen) Benaloh. The main improvement of the Benaloh Cryptosystem over GM is that longer blocks of data can be encrypted at once, whereas in GM each bit is encrypted individually.
Scheme Definition
Like many public key cryptosystems, this scheme works in the group
(
Z
/
n
Z
)
∗
{\displaystyle (\mathbb {Z} /n\mathbb {Z} )^{*}}
where n is a product of two large primes. This scheme is homomorphic and hence malleable.
= Key Generation
=Given block size r, a public/private key pair is generated as follows:
Choose large primes p and q such that
r
|
(
p
−
1
)
,
gcd
(
r
,
(
p
−
1
)
/
r
)
=
1
,
{\displaystyle r\vert (p-1),\operatorname {gcd} (r,(p-1)/r)=1,}
and
gcd
(
r
,
(
q
−
1
)
)
=
1
{\displaystyle \operatorname {gcd} (r,(q-1))=1}
Set
n
=
p
q
,
ϕ
=
(
p
−
1
)
(
q
−
1
)
{\displaystyle n=pq,\phi =(p-1)(q-1)}
Choose
y
∈
Z
n
∗
{\displaystyle y\in \mathbb {Z} _{n}^{*}}
such that
y
ϕ
/
r
≢
1
mod
n
{\displaystyle y^{\phi /r}\not \equiv 1\mod n}
.
Note: If r is composite, it was pointed out by Fousse et al. in 2011 that the above conditions (i.e., those stated in the original paper) are insufficient to guarantee correct decryption, i.e., to guarantee that
D
(
E
(
m
)
)
=
m
{\displaystyle D(E(m))=m}
in all cases (as should be the case). To address this, the authors propose the following check: let
r
=
p
1
p
2
…
p
k
{\displaystyle r=p_{1}p_{2}\dots p_{k}}
be the prime factorization of r. Choose
y
∈
Z
n
∗
{\displaystyle y\in \mathbb {Z} _{n}^{*}}
such that for each factor
p
i
{\displaystyle p_{i}}
, it is the case that
y
ϕ
/
p
i
≠
1
mod
n
{\displaystyle y^{\phi /p_{i}}\neq 1\mod n}
.
Set
x
=
y
ϕ
/
r
mod
n
{\displaystyle x=y^{\phi /r}\mod n}
The public key is then
y
,
n
{\displaystyle y,n}
, and the private key is
ϕ
,
x
{\displaystyle \phi ,x}
.
= Message Encryption
=To encrypt message
m
∈
Z
r
{\displaystyle m\in \mathbb {Z} _{r}}
:
Choose a random
u
∈
Z
n
∗
{\displaystyle u\in \mathbb {Z} _{n}^{*}}
Set
E
r
(
m
)
=
y
m
u
r
mod
n
{\displaystyle E_{r}(m)=y^{m}u^{r}\mod n}
= Message Decryption
=To decrypt a ciphertext
c
∈
Z
n
∗
{\displaystyle c\in \mathbb {Z} _{n}^{*}}
:
Compute
a
=
c
ϕ
/
r
mod
n
{\displaystyle a=c^{\phi /r}\mod n}
Output
m
=
log
x
(
a
)
{\displaystyle m=\log _{x}(a)}
, i.e., find m such that
x
m
≡
a
mod
n
{\displaystyle x^{m}\equiv a\mod n}
To understand decryption, first notice that for any
m
∈
Z
r
{\displaystyle m\in \mathbb {Z} _{r}}
and
u
∈
Z
n
∗
{\displaystyle u\in \mathbb {Z} _{n}^{*}}
we have:
a
=
(
c
)
ϕ
/
r
≡
(
y
m
u
r
)
ϕ
/
r
≡
(
y
m
)
ϕ
/
r
(
u
r
)
ϕ
/
r
≡
(
y
ϕ
/
r
)
m
(
u
)
ϕ
≡
(
x
)
m
(
u
)
0
≡
x
m
mod
n
{\displaystyle a=(c)^{\phi /r}\equiv (y^{m}u^{r})^{\phi /r}\equiv (y^{m})^{\phi /r}(u^{r})^{\phi /r}\equiv (y^{\phi /r})^{m}(u)^{\phi }\equiv (x)^{m}(u)^{0}\equiv x^{m}\mod n}
To recover m from a, we take the discrete log of a base x. If r is small, we can recover m by an exhaustive search, i.e. checking if
x
i
≡
a
mod
n
{\displaystyle x^{i}\equiv a\mod n}
for all
0
…
(
r
−
1
)
{\displaystyle 0\dots (r-1)}
. For larger values of r, the Baby-step giant-step algorithm can be used to recover m in
O
(
r
)
{\displaystyle O({\sqrt {r}})}
time and space.
= Security
=The security of this scheme rests on the Higher residuosity problem, specifically, given z,r and n where the factorization of n is unknown, it is computationally infeasible to determine whether z is an rth residue mod n, i.e. if there exists an x such that
z
≡
x
r
mod
n
{\displaystyle z\equiv x^{r}\mod n}
.
References
Kata Kunci Pencarian:
- Benaloh cryptosystem
- Rabin cryptosystem
- RSA (cryptosystem)
- Homomorphic encryption
- Paillier cryptosystem
- ElGamal encryption
- Cramer–Shoup cryptosystem
- Key escrow
- Merkle–Hellman knapsack cryptosystem
- Threshold cryptosystem