Skip to main content

Generating a product of three primes with an unknown factorization

  • Conference paper
  • First Online:
Algorithmic Number Theory (ANTS 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1423))

Included in the following conference series:

Abstract

We describe protocols for three or more parties to jointly generate a composite N=pqr which is the product of three primes. After our protocols terminate N is publicly known, but neither party knows the factorization of N. Our protocols require the design of a new type of distributed primality test for testing that a given number is a product of three primes. We explain the cryptographic motivation and origin of this problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault tolerant distributed computation. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pages 1–10. ACM Press, 1988.

    Google Scholar 

  2. D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Proceedings of Advances in Cryptology: CRYPTO '97, pages 425–439. Lecture Notes in Computer Science, Springer-Verlag, New York, 1998.

    Google Scholar 

  3. M. Blum and S. Goldwasser. An efficient probabilistic public key encryption scheme that hides all partial information. In Proceedings of Advances in Cryptology: CRYPTO '84, pages 289–302. Lecture Notes in Computer Science, Springer-Verlag, New York, 1985.

    Google Scholar 

  4. D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pages 11–19. ACM Press, 1988.

    Google Scholar 

  5. C. Cocks. Split knowledge generation of RSA parameters. Available from the author (cliff_cocks@cesg. gov.uk).

    Google Scholar 

  6. R. Fagin, M. Naor, and P. Winkler. Comparing information without leaking it. Communications of the ACM, 39(5):77–85, May 1996.

    Article  Google Scholar 

  7. Y. Frankel. A practical protocol for large group oriented networks. In Proceedings of Advances in Cryptology: EUROCRYPT '88, pages 56–61. Lecture Notes in Computer Science, Springer-Verlag, New York, 1990.

    Google Scholar 

  8. Y. Frankel, P. MacKenzie, and M. Yung. Robust efficient distributed RSA key generation. Preprint.

    Google Scholar 

  9. P. Gemmel. An introduction to threshold cryptography. CryptoBytes (a technical newsletter of RSA Laboratories), 2(7), 1997.

    Google Scholar 

  10. J. Grantham. A probable prime test with high confidence. Available online (http://www.clark.net/pub/grantham/pseudo/).

    Google Scholar 

  11. R. Peralta and J. van de Graaf. A simple and secure way to show the validity of your public key. In Proceedings of Advances in Cryptology: CRYPTO '87, pages 128–134. Lecture Notes in Computer Science, Springer-Verlag, New York, 1988.

    Google Scholar 

  12. A. Lenstra and H. W. Lenstra ed. The development of the number field sieve. Lecture Notes in Computer Science 1554, Springer-Verlag, 1994.

    Google Scholar 

  13. H. W. Lenstra. Factoring integers with elliptic curves. Annals of Mathematics, 126:649–673, 1987.

    Article  MATH  MathSciNet  Google Scholar 

  14. A. Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, November 1979.

    Article  MATH  MathSciNet  Google Scholar 

  15. M. Wiener. Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory, 36(3):553–558, 1990.

    Article  MATH  MathSciNet  Google Scholar 

  16. A. Yao. How to generate and exchange secrets. In Proceedings of the 27th Annual ACM Symposium on Theory of Computing, pages 162–167. IEEE Press, 1986.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Joe P. Buhler

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Boneh, D., Horwitz, J. (1998). Generating a product of three primes with an unknown factorization. In: Buhler, J.P. (eds) Algorithmic Number Theory. ANTS 1998. Lecture Notes in Computer Science, vol 1423. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054866

Download citation

  • DOI: https://doi.org/10.1007/BFb0054866

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64657-0

  • Online ISBN: 978-3-540-69113-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics