Attack against Ibrahim's Distributed Key Generation for RSA

Distributed RSA key generation protocols aim to generate RSA keys in such a way that no single participant of the protocol can learn factorization of the RSA modulus. In this note we show that two recent protocols of this kind (Journal of Network Security, Vol. 7, No. 1, 2008, pp. 106-113 and Vol. 8, No. 2, 2009, pp. 139-150) fail their security target. We present an attack that can be launched by any protocol participant after terminating distributed key generation process.

[1]  André L. M. dos Santos,et al.  Implementation of fast RSA key generation on smart cards , 2002, SAC '02.

[2]  Jan Camenisch,et al.  Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.

[3]  Matthew K. Franklin,et al.  Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.

[4]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[5]  Moti Yung,et al.  Robust efficient distributed RSA-key generation , 1998, STOC '98.

[6]  John Kubiatowicz,et al.  Optimizing Robustness While Generating Shared Secret Safe Primes , 2005, Public Key Cryptography.

[7]  Jean-Sébastien Coron,et al.  Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring , 2006, Journal of Cryptology.

[8]  Clifford C. Cocks Split Knowledge Generation of RSA Parameters , 1997, IMACC.

[9]  Mike Burmester,et al.  Weaknesses in Shared RSA Key Generation Protocols , 1999, IMACC.

[10]  Marc Joye,et al.  Fast Generation of Prime Numbers on Portable Devices: An Update , 2006, CHES.

[11]  Maged Hamada Ibrahim,et al.  Efficient Dealer-Less Threshold Sharing of Standard RSA , 2009, Int. J. Netw. Secur..

[12]  Ivan Damgård,et al.  Efficient, Robust and Constant-Round Distributed RSA Key Generation , 2010, TCC.

[13]  Marc Joye,et al.  Cheating in split-knowledge RSA parameter generation , 1998 .

[14]  Maged Hamada Ibrahim,et al.  Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing , 2008, Int. J. Netw. Secur..