Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Trapdoor function

From Wikipedia, the free encyclopedia
One-way cryptographic tool
This article is about the mathematical cryptography function. For the method of bypassing security, seeBackdoor (computing).
icon
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Trapdoor function" – news ·newspapers ·books ·scholar ·JSTOR
(July 2013) (Learn how and when to remove this message)
The idea of trapdoor function. A trapdoor functionf with its trapdoort can be generated by an algorithmGen.f can be efficiently computed, i.e., in probabilisticpolynomial time. However, the computation of the inverse off is generally hard, unless the trapdoort is given.[1]

Intheoretical computer science andcryptography, atrapdoor function is afunction that is easy to compute in one direction, yet difficult to compute in the opposite direction (finding itsinverse) without special information, called the "trapdoor". Trapdoor functions are a special case ofone-way functions and are widely used inpublic-key cryptography.[2]

In mathematical terms, iff is a trapdoor function, then there exists some secret informationt, such that givenf(x) andt, it is easy to computex. Consider apadlock and its key. It is trivial to change the padlock from open to closed without using the key, by pushing the shackle into the lock mechanism. Opening the padlock easily, however, requires the key to be used. Here the keyt is the trapdoor and the padlock is the trapdoor function.

An example of a simple mathematical trapdoor is "6895601 is the product of two prime numbers. What are those numbers?" A typical "brute-force" solution would be to try dividing 6895601 by many prime numbers until finding the answer. However, if one is told that 1931 is one of the numbers, one can find the answer by entering "6895601 ÷ 1931" into any calculator. This example is not a sturdy trapdoor function – modern computers can guess all of the possible answers within a second – but this sample problem could be improved byusing the product of two much larger primes.

Trapdoor functions came to prominence incryptography in the mid-1970s with the publication ofasymmetric (or public-key) encryption techniques byDiffie,Hellman, andMerkle. Indeed,Diffie & Hellman (1976) coined the term. Several function classes had been proposed, and it soon became obvious that trapdoor functions are harder to find than was initially thought. For example, an early suggestion was to use schemes based on thesubset sum problem. This turned out rather quickly to be unsuitable.

As of 2004[update], the best known trapdoor function (family) candidates are theRSA andRabin families of functions. Both are written as exponentiation modulo a composite number, and both are related to the problem ofprime factorization.

Functions related to the hardness of thediscrete logarithm problem (either modulo a prime or in a group defined over anelliptic curve) arenot known to be trapdoor functions, because there is no known "trapdoor" information about the group that enables the efficient computation of discrete logarithms.

A trapdoor in cryptography has the very specific aforementioned meaning and is not to be confused with abackdoor (these are frequently used interchangeably, which is incorrect). A backdoor is a deliberate mechanism that is added to a cryptographic algorithm (e.g., a key pair generation algorithm, digital signing algorithm, etc.) or operating system, for example, that permits one or more unauthorized parties to bypass or subvert the security of the system in some fashion.

Definition

[edit]

Atrapdoor function is a collection ofone-way functions {fk :DkRk } (kK), in which all ofK,Dk,Rk are subsets of binary strings {0, 1}*, satisfying the following conditions:

  • There exists a probabilistic polynomial time (PPT)sampling algorithm Gen s.t. Gen(1n) = (k,tk) withkK ∩ {0, 1}n andtk ∈ {0, 1}* satisfies |tk | <p (n), in whichp is some polynomial. Eachtk is called thetrapdoor corresponding tok. Each trapdoor can be efficiently sampled.
  • Given inputk, there also exists a PPT algorithm that outputsxDk. That is, eachDk can be efficiently sampled.
  • For anykK, there exists a PPT algorithm that correctly computesfk.
  • For anykK, there exists a PPT algorithmA s.t. for anyxDk, lety =A (k,fk(x),tk ), and then we havefk(y) =fk(x). That is, given trapdoor, it is easy to invert.
  • For anykK, without trapdoortk, for any PPT algorithm, the probability to correctly invertfk (i.e., givenfk(x), find a pre-imagex' such thatfk(x') =fk(x)) is negligible.[3][4][5]

If each function in the collection above is a one-way permutation, then the collection is also called atrapdoor permutation.[6]

Examples

[edit]

In the following two examples, we always assume that it is difficult to factorize a large composite number (seeInteger factorization).

RSA assumption

[edit]

In this example, the inversed{\displaystyle d} ofe{\displaystyle e} moduloϕ(n){\displaystyle \phi (n)} (Euler's totient function ofn{\displaystyle n}) is the trapdoor:

f(x)=xemodn.{\displaystyle f(x)=x^{e}\mod n.}

If the factorization ofn=pq{\displaystyle n=pq} is known, thenϕ(n)=(p1)(q1){\displaystyle \phi (n)=(p-1)(q-1)} can be computed. With this the inversed{\displaystyle d} ofe{\displaystyle e} can be computedd=e1modϕ(n){\displaystyle d=e^{-1}\mod {\phi (n)}}, and then giveny=f(x){\displaystyle y=f(x)}, we can findx=ydmodn=xedmodn=xmodn{\displaystyle x=y^{d}\mod n=x^{ed}\mod n=x\mod n}.Its hardness follows from the RSA assumption.[7]

Rabin's quadratic residue assumption

[edit]

Letn{\displaystyle n} be a large composite number such thatn=pq{\displaystyle n=pq}, wherep{\displaystyle p} andq{\displaystyle q} are large primes such thatp3(mod4),q3(mod4){\displaystyle p\equiv 3{\pmod {4}},q\equiv 3{\pmod {4}}}, and kept confidential to the adversary. The problem is to computez{\displaystyle z} givena{\displaystyle a} such thataz2(modn){\displaystyle a\equiv z^{2}{\pmod {n}}}. The trapdoor is the factorization ofn{\displaystyle n}. With the trapdoor, the solutions ofz can be given ascx+dy,cxdy,cx+dy,cxdy{\displaystyle cx+dy,cx-dy,-cx+dy,-cx-dy}, whereax2(modp),ay2(modq),c1(modp),c0(modq),d0(modp),d1(modq){\displaystyle a\equiv x^{2}{\pmod {p}},a\equiv y^{2}{\pmod {q}},c\equiv 1{\pmod {p}},c\equiv 0{\pmod {q}},d\equiv 0{\pmod {p}},d\equiv 1{\pmod {q}}}. SeeChinese remainder theorem for more details. Note that given primesp{\displaystyle p} andq{\displaystyle q}, we can findxap+14(modp){\displaystyle x\equiv a^{\frac {p+1}{4}}{\pmod {p}}} andyaq+14(modq){\displaystyle y\equiv a^{\frac {q+1}{4}}{\pmod {q}}}. Here the conditionsp3(mod4){\displaystyle p\equiv 3{\pmod {4}}} andq3(mod4){\displaystyle q\equiv 3{\pmod {4}}} guarantee that the solutionsx{\displaystyle x} andy{\displaystyle y} can be well defined.[8]

See also

[edit]

Notes

[edit]
  1. ^Ostrovsky, pp. 6–9
  2. ^Bellare, M (June 1998). "Many-to-one trapdoor functions and their relation to public-key cryptosystems".Advances in Cryptology — CRYPTO '98. Lecture Notes in Computer Science. Vol. 1462. pp. 283–298.doi:10.1007/bfb0055735.ISBN 978-3-540-64892-5.S2CID 215825522.
  3. ^Pass's Notes, def. 56.1
  4. ^Goldwasser's lecture notes, def. 2.16
  5. ^Ostrovsky, pp. 6–10, def. 11
  6. ^Pass's notes, def 56.1; Dodis's def 7, lecture 1.
  7. ^Goldwasser's lecture notes, 2.3.2; Lindell's notes, p. 17, Ex. 1.
  8. ^Goldwasser's lecture notes, 2.3.4.

References

[edit]
Algorithms
Integer factorization
Discrete logarithm
Lattice/SVP/CVP/LWE/SIS
Others
Theory
Standardization
Topics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Trapdoor_function&oldid=1317857107"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp