The Bit Security of Paillier’s Encryption Scheme and Its Applications
- 1.7k Downloads
At EuroCrypt'99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N-residuosity classes in Z * N 2 is hard. Similarly the scheme can be proven to be semantically secure under a much stronger decisional assumption: given w ∈ Z * N 2 it is hard to decide if w is an N-residue or not.
In this paper we examine the bit security of Paillier’s scheme. We prove that, if computing residuosity classes is hard, then given a random w it is impossible to predict the least significant bit of its class significantly better than at random. This immediately yields a way to obtain semantic security without relying on the decisional assumption (at the cost of several invocations of Paillier's original function).
In order to improve efficiency we then turn to the problem of simultaneous security of many bits. We prove that Paillier's scheme hides n − b (up to O(n)) bits if one assumes that computing the class c of a random w remains hard even when we are told that c < 2b. We thoroughly examine the security of this stronger version of the intractability of the class problem.
An important theoretical implication of our result is the construction of the first trapdoor function that hides super-logarithmically (up to O(n)) many bits. We generalize our techniques to provide sufficient conditions for a trapdoor function to have this property.
KeywordsEncryption Scheme Inversion Algorithm Probabilistic Polynomial Time Trapdoor Function Trapdoor Permutation
- 2.J.C. Benaloh. Verifiable Secret-Ballot Elections. Ph.D. Thesis, Yale University, 1988.Google Scholar
- 3.M. Blum and S. Goldwasser. An efficient probabilistic public-key encryption scheme which hides all partial information. Proc. of Crypto '84, LNCS vol. 196, pages 289–302Google Scholar
- 6.O. Goldreich and L. Levin A hard-core predicate for all one-way functions. Proc. 21 st ACM Symposium on Theory of Computing, 1989Google Scholar
- 9.T. Okamoto and S. Uchiyama. A New Public-Key Cryptosystem as Secure as Factoring In Advances in Cryptology-Eurocrypt '97, LNCS vol. 1233, Springer, 1997, pages 308–318.Google Scholar
- 10.P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology-Eurocrypt '99, LNCS vol. 1592, Springer, 1997, pages 223–238.Google Scholar
- 12.M. Rabin. Digital Signatures and Public Key Encryptions as Intractable as Factorization. MITT echnical Report no. 212, 1979Google Scholar
- 14.A. Yao. Theory and Applications of Trapdoor Functions. IEEE FOCS, 1982.Google Scholar