In
cryptography, most
public key cryptosystems are founded on problems that are believed to be intractable. The higher residuosity problem (also called the n th-residuosity problem
) is one such problem. This problem is ''easier'' to solve than
integer factorization
In number theory, integer factorization is the decomposition of a composite number into a product of smaller integers. If these factors are further restricted to prime numbers, the process is called prime factorization.
When the numbers are suf ...
, so the assumption that this problem is hard to solve is ''stronger'' than the assumption that integer factorization is hard.
Mathematical background
If ''n'' is an
integer, then the integers
modulo
In computing, the modulo operation returns the remainder or signed remainder of a division, after one number is divided by another (called the '' modulus'' of the operation).
Given two positive numbers and , modulo (often abbreviated as ) is t ...
''n'' form a
ring. If ''n''=''pq'' where ''p'' and ''q'' are
primes, then the
Chinese remainder theorem
In mathematics, the Chinese remainder theorem states that if one knows the remainders of the Euclidean division of an integer ''n'' by several integers, then one can determine uniquely the remainder of the division of ''n'' by the product of thes ...
tells us that
:
The
group of units
In algebra, a unit of a ring is an invertible element for the multiplication of the ring. That is, an element of a ring is a unit if there exists in such that
vu = uv = 1,
where is the multiplicative identity; the element is unique for this ...
of any ring form a
group, and the group of units in
is traditionally denoted
.
From the isomorphism above, we have
:
as an isomorphism of ''groups''. Since ''p'' and ''q'' were assumed to be prime, the groups
and
are
cyclic of orders ''p''-1 and ''q''-1 respectively. If ''d'' is a divisor of ''p''-1, then the set of ''d''th powers in
form a subgroup of
index
Index (or its plural form indices) may refer to:
Arts, entertainment, and media Fictional entities
* Index (''A Certain Magical Index''), a character in the light novel series ''A Certain Magical Index''
* The Index, an item on a Halo megastru ...
''d''. If gcd(''d'',''q''-1) = 1, then ''every'' element in
is a ''d''th power, so the set of ''d''th powers in
is also a subgroup of index ''d''. In general, if gcd(''d'',''q''-1) = ''g'', then there are (''q''-1)/(''g'') ''d''th powers in
, so the set of ''d''th powers in
has index ''dg''.
This is most commonly seen when ''d''=2, and we are considering the subgroup of
quadratic residues, it is well known that exactly one quarter of the elements in
are
quadratic residues (when ''n'' is the product of exactly two primes, as it is here).
The important point is that for any divisor ''d'' of ''p''-1 (or ''q''-1) the set of ''d''th powers forms a subgroup of
Problem statement
Given an integer ''n'' = ''pq'' where ''p'' and ''q'' are unknown, an integer ''d'' such that ''d'' divides ''p''-1, and an integer ''x'' < ''n'', it is infeasible to determine whether ''x'' is a ''d''th power (equivalently ''d''th residue) modulo ''n''.
Notice that if ''p'' and ''q'' are known it is easy to determine whether ''x'' is a ''d''th residue modulo ''n'' because ''x'' will be a ''d''th residue modulo ''p'' if and only if
:
When ''d''=2, this is called the
quadratic residuosity problem.
Applications
The
semantic security In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the ciph ...
of the
Benaloh cryptosystem and the
Naccache–Stern cryptosystem
The Naccache–Stern cryptosystem is a homomorphic public-key cryptosystem whose security rests on the higher residuosity problem. The Naccache–Stern cryptosystem was discovered by David Naccache and Jacques Stern in 1998.
Scheme Definition
L ...
rests on the intractability of this problem.
References
{{DEFAULTSORT:Higher Residuosity Problem
Computational number theory
Computational hardness assumptions