- Blum-Goldwasser cryptosystem
The Blum-Goldwasser (BG) cryptosystem is an
asymmetric key encryption algorithm proposed byManuel Blum andShafi Goldwasser in1984 . Blum-Goldwasser is a probabilistic, semantically secure cryptosystem with a constant-sizeciphertext expansion . The encryption algorithm implements an XOR-basedstream cipher using theBlum Blum Shub (BBS) pseudo-random number generator to generate thekeystream . Decryption is accomplished by manipulating the final state of the BBS generator using the secret key, in order to find the initial seed and reconstruct the keystream.The BG cryptosystem is semantically secure based on the assumed intractability of
integer factorization ; specifically, factoring a composite value where are large primes. BG has multiple advantages over earlier probabilistic encryption schemes such as theGoldwasser-Micali cryptosystem . First, its semantic security reduces solely to integer factorization, without requiring any additional assumptions (e.g., hardness of thequadratic residuosity problem or theRSA problem ). Secondly, BG is efficient in terms of storage, inducing a constant-sizeciphertext expansion regardless of message length. BG is also relatively efficient in terms of computation, and fairs well even in comparison with cryptosystems such as RSA (depending on message length and exponent choices). However, BG is highly vulnerable to adaptive chosen ciphertext attacks (see below).Because encryption is performed using a probabilistic algorithm, a given plaintext may produce very different ciphertexts each time it is encrypted. This has significant advantages, as it prevents an adversary from recognizing intercepted messages by comparing them to a dictionary of known ciphertexts.
cheme definition
Note that the following description is a draft, and may contain errors!
Blum-Goldwasser consists of three algorithms: a probabilistic key generation algorithm which produces a public and a private key, a probabilistic encryption algorithm, and a deterministic decryption algorithm.
Key generation
To allow for decryption, the modulus used in Blum-Goldwasser encryption should be a
Blum integer . This value is generated in the same manner as anRSA modulus, except that the prime factors must be congruent to 3 mod 4. (SeeRSA , key generation for details.)#Alice generates two large
prime number s and such that , randomly and independently of each other, where mod .
#Alice computes .The "public key" is . The secret key is the factorization .
Message encryption
Suppose Bob wishes to send a message "m" to Alice:
#Bob first encodes as a string of bits .
#Bob selects a random element , where , and computes .
#Bob uses the BBS pseudo-random number generator to generate random bits (the keystream), as follows:
##For to :
##Set equal to the least-significant bit of .
##Increment .
##Compute .
#Compute the ciphertext by XORing the plaintext bits with the keystream: .Bob sends the ciphertext .
To improve performance, the BBS generator can securely output up to of the least-significant bits of during each round. See
Blum Blum Shub for details.Message decryption
Alice receives . She can recover using the following procedure:
#Using the prime factorization , Alice computes and .
#Compute the initial seed
#From , recompute the bit-vector using the BBS generator, as in the encryption algorithm.
#Compute the plaintext by XORing the keystream with the ciphertext: .Alice recovers the plaintext .
Security and efficiency
The Blum-Goldwasser scheme is
semantically-secure based on the hardness of predicting the keystream bits given only the final BBS state and the public key . However, ciphertexts of the form are vulnerable to anadaptive chosen ciphertext attack in which the adversary requests the decryption of a chosen ciphertext . The decryption of the original ciphertext can be computed as .Depending on plaintext size, BG may be more or less computationally expensive than RSA. Because most RSA deployments use a fixed encryption exponent optimized to minimize encryption time, RSA encryption will typically outperform BG for all but the shortest messages. However, as the RSA decryption exponent is randomly distributed, modular exponentiation may require a comparable number of squarings/multiplications to BG decryption for a ciphertext of the same length. BG has the advantage of scaling more efficiently to longer ciphertexts, where RSA requires multiple separate encryptions. In these cases, BG may be significantly more efficient.
References
#M. Blum, S. Goldwasser, "An Efficient Probabilistic Public Key Encryption Scheme which Hides All Partial Information", Proceedings of "Advances in Cryptology - CRYPTO '84", pp. 289-299, Springer Verlag, 1985.
#Menezes, Alfred; van Oorschot, Paul C.; and Vanstone, Scott A. "Handbook of Applied Cryptography". CRC Press, October 1996. ISBN 0-8493-8523-7External links
* [http://www.cacr.math.uwaterloo.ca/hac/ Menezes, Oorschot, Vanstone, Scott: "Handbook of Applied Cryptography" (free PDF downloads), see Chapter 8]
Wikimedia Foundation. 2010.