- Damgård–Jurik cryptosystem
-
The Damgård–Jurik cryptosystem[1] is a generalization of the Paillier cryptosystem. It uses computations modulo ns + 1 where n is an RSA modulus and s a (positive) natural number. Paillier's scheme is the special case with s = 1. The order φ(ns + 1) (Euler's totient function) of can be divided by ns. Moreover can be written as the direct product of . G is cyclic and of order ns, while H is isomorphic to . For encryption, the message is transformed into the corresponding coset of the factor group G / H and the security of the scheme relies on the difficulty of distinguishing random elements in different cosets of H. It is semantically secure if it is hard to decide if two given elements are in the same coset. Like Paillier, the security of Damgård–Jurik can be proven under the decisional composite residuosity assumption.
Contents
Key generation
- Choose two large prime numbers p and q randomly and independently of each other.
- Compute n = pq and λ = lcm(p − 1,q − 1).
- Choose an element such that for a known j relative prime to n and .
- Using the Chinese Remainder Theorem, choose d such that and . For instance d could be λ as in Paillier's original scheme.
- The public (encryption) key is (n,g).
- The private (decryption) key is d.
Encryption
- Let m be a message to be encrypted where .
- Select random r where .
- Compute ciphertext as: .
Decryption
- Ciphertext
- Compute . If c is a valid ciphertext then .
- Apply a recursive version of the Paillier decryption mechanism to obtain jmd. As jd is known, it is possible to compute .
Simplification
At the cost of no longer containing the classical Paillier cryptosystem as an instance, Damgård–Jurik can be simplified in the following way:
- The base g is fixed as g = n + 1.
- The decryption exponent d is computed such that and .
In this case decryption produces . Using recursive Paillier decryption this gives us directly the plaintext m.
See also
- The Damgård–Jurik cryptosystem interactive simulator demonstrates a voting application.
References
- ^ Ivan Damgård, Mads Jurik: A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Public Key Cryptography 2001: 119-136
Public-key cryptography Algorithms Benaloh · Blum–Goldwasser · Cayley–Purser · CEILIDH · Cramer–Shoup · Damgård–Jurik · DH · DSA · EPOC · ECDH · ECDSA · EKE · ElGamal (encryption · signature scheme) · GMR · Goldwasser–Micali · HFE · IES · Lamport · McEliece · Merkle–Hellman · MQV · Naccache–Stern · NTRUEncrypt · NTRUSign · Paillier · Rabin · RSA · Okamoto–Uchiyama · Schnorr · Schmidt–Samoa · SPEKE · SRP · STS · Three-pass protocol · XTR
Theory Standardization ANS X9F1 · CRYPTREC · IEEE P1363 · NESSIE · NSA Suite B
Topics Digital signature · OAEP · Fingerprint · PKI · Web of trust · Key size
Cryptography Categories:- Asymmetric-key cryptosystems
Wikimedia Foundation. 2010.