New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol

  • Xiaopeng Zhao
  • , Zhenfu Cao*
  • , Xiaolei Dong
  • , Jun Shao
  • , Licheng Wang
  • , Zhusen Liu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The e-th power residue symbol (Formula Presented) is a useful mathematical tool in cryptography, where (Formula Presented) is an integer, (Formula Presented) is a prime ideal in the prime factorization of (Formula Presented) with a large prime p satisfying (Formula Presented) is an e-th primitive root of unity. One famous case of the e-th power symbol is the first semantic secure public key cryptosystem due to Goldwasser and Micali (at STOC 1982). In this paper, we revisit the e-th power residue symbol and its applications. In particular, we prove that computing the e-th power residue symbol is equivalent to solving the discrete logarithm problem. By this result, we give a natural extension of the Goldwasser-Micali cryptosystem, where e is an integer only containing small prime factors. Compared to another extension of the Goldwasser-Micali cryptosystem due to Joye and Libert (at EUROCRYPT 2013), our proposal is more efficient in terms of bandwidth utilization and decryption cost. With a new hardness assumption naturally extended from the one used in the Goldwasser-Micali cryptosystem, our proposal is provable IND-CPA secure. Furthermore, we show that our results on the e-th power residue symbol can also be used to construct lossy trapdoor functions and circular and leakage resilient public key encryptions with more efficiency and better bandwidth utilization.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 25th Australasian Conference, ACISP 2020, Proceedings
EditorsJoseph K. Liu, Hui Cui
PublisherSpringer Science and Business Media Deutschland GmbH
Pages408-424
Number of pages17
ISBN (Print)9783030553036
DOIs
StatePublished - 2020
Event25th Australasian Conference on Information Security and Privacy, ACISP 2020 - Virtual, Online, Australia
Duration: 30 Nov 20202 Dec 2020

Publication series

NameLecture Notes in Computer Science
Volume12248 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference25th Australasian Conference on Information Security and Privacy, ACISP 2020
Country/TerritoryAustralia
CityVirtual, Online
Period30/11/202/12/20

Keywords

  • Goldwasser-Micali cryptosystem
  • Joye-Libert cryptosystem
  • Leakage resilient public key encryption
  • Lossy trapdoor function
  • Power residue symbol

Fingerprint

Dive into the research topics of 'New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol'. Together they form a unique fingerprint.

Cite this