Table of contents

  • This session has been presented January 26, 2007.

Description

  • Speaker

    Pascal Paillier - Gemplus

We focus on two new number-theoretic problems of major importance for RSA and factoring-based cryptosystems. An RSA key generator Gen(1^k) = (n, e) is malleable when factoring n is easier when given access to a factoring oracle for other keys (n', e')!= (n, e) output by Gen. Gen is instance-malleable when it is easier to extract e-th roots mod n given an e'-th root extractor mod n' for (n', e') != (n , e) output by Gen. Instance-non-malleable generators are of prime importance for practical RSA-based systems (RSA-PSS, RSA-OAEP, etc) because their security can be shown not to be equivalent to RSA in the standard model, in contradiction with the random oracle heuristic. We investigate the malleability and instance-malleability of popular RSA key generators such as textbook RSA and low-exponent RSA and question the existence of non-trivial malleable RSA instances.

Next sessions

  • Algorithms for post-quantum commutative group actions

    • March 27, 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Marc Houben - Inria Bordeaux

    At the historical foundation of isogeny-based cryptography lies a scheme known as CRS; a key exchange protocol based on class group actions on elliptic curves. Along with more efficient variants, such as CSIDH, this framework has emerged as a powerful building block for the construction of advanced post-quantum cryptographic primitives. Unfortunately, all protocols in this line of work are[…]
  • Journées C2: pas de séminaire

    • April 03, 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

  • Endomorphisms via Splittings

    • April 10, 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Min-Yi Shen - No Affiliation

    One of the fundamental hardness assumptions underlying isogeny-based cryptography is the problem of finding a non-trivial endomorphism of a given supersingular elliptic curve. In this talk, we show that the problem is related to the problem of finding a splitting of a principally polarised superspecial abelian surface. In particular, we provide formal security reductions and a proof-of-concept[…]
    • Cryptography

Show previous sessions