Skip to main content

Blum–Goldwasser Public Key Encryption System

  • Reference work entry
  • 114 Accesses

Definition

The Blum–Goldwasser public key encryption system combines the general construction of Goldwasser–Micali [1] with the concrete Blum–Blum–Shub pseudorandom bit generator [2] to obtain an efficient semantically secure public key encryption whose security is based on the difficulty of factoring Blum integers.

Theory

The system makes use of modular arithmetic and works as follows:

Key Generation. Given a security parameter \(\tau \in \mathbb{Z}\) as input, generate two random \(\tau \)-bit primes p,  q where p = q = 3 mod 4. Set \(N = {\it { pq}} \in Z\). The public key is N and private key is (p,  q).

Encryption. To encrypt a message \(m = {m}_{1}\ldots {m}_{\ell} \in \{0,\ 1{\}}^{\ell}\):

  1. 1.

    Pick a random x in the group \({\mathbb{Z}}_{N}^{{_\ast}}\) and set \({x}_{1} = {x}^{2} \in {\mathbb{Z}}_{N}^{{_\ast}}\).

  2. 2.

    For \(i = 1,\ \ldots,\ \ell\):

    1. (a)

      View \({x}_{i}\) as an integer in [0,  N − 1] and let \({b}_{i} \in \{0,\ 1\}\) be the least significant bit of \({x}_{i}\).

      ...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Goldwasser S, Micali S (1984) Probabilistic encryption. J Comput Syst Sci (JCSS) 28(2):270–299

    Article  MATH  MathSciNet  Google Scholar 

  2. Blum L, Blum M, Shub M (1983) Comparison of two pseudo-random number generators. In: Chaum D (ed) Advances in cryptology – CRYPTO’83, New York. Springer, Berlin, pp 61–78

    Google Scholar 

  3. Fujisaki E, Okamoto T (1999) Secure integration of asymmetric and symmetric encryption schemes. In: Wiener J (ed) Advances in cryptology – CRYPTO’99, Santa Barbara. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, pp 537–554

    Google Scholar 

  4. Bellare M, Rogaway P (1996) The exact security of digital signatures: how to sign with RSA and Rabin. In: Maurer U (ed) Advances in cryptology – EUROCRYPT’96, Saragossa. Lecture Notes in Computer Science, vol 1070. Springer, Berlin, pp 399–416

    Google Scholar 

  5. Boneh D (2001) Simplified OAEP for the RSA and Rabin functions. In: Kilian J (ed) Advances in cryptology – CRYPTO 2001, Santa Barbara. Lecture Notes in Computer Science, vol 2139. Springer, Berlin

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Boneh, D. (2011). Blum–Goldwasser Public Key Encryption System. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_142

Download citation

Publish with us

Policies and ethics