Factorization and Malleability of RSA Moduli, and Counting Points on Elliptic Curves Modulo N
-
Published:2020-11-27
Issue:12
Volume:8
Page:2126
-
ISSN:2227-7390
-
Container-title:Mathematics
-
language:en
-
Short-container-title:Mathematics
Author:
Dieulefait Luis V.,Urroz Jorge
Abstract
In this paper we address two different problems related with the factorization of an RSA (Rivest–Shamir–Adleman cryptosystem) modulus N. First we show that factoring is equivalent, in deterministic polynomial time, to counting points on a pair of twisted Elliptic curves modulo N. The second problem is related with malleability. This notion was introduced in 2006 by Pailler and Villar, and deals with the question of whether or not the factorization of a given number N becomes substantially easier when knowing the factorization of another one N′ relatively prime to N. Despite the efforts done up to now, a complete answer to this question was unknown. Here we settle the problem affirmatively. To construct a particular N′ that helps the factorization of N, we use the number of points of a single elliptic curve modulo N. Coppersmith’s algorithm allows us to go from the factors of N′ to the factors of N in polynomial time.
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference23 articles.
1. Factoring integers with the number field sieve;Buhler,1993
2. On polynomial selection for the general number field sieve
3. A kilobit special number field sieve factorization;Aoki;Asiacrypt LNCS,2008
4. Efficient networks for quantum factoring
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Elliptic-Curve Factorization and Witnesses;Lecture Notes in Computer Science;2024
2. On oracle factoring of integers;Journal of Complexity;2023-06