Skip to main content
Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Journal of Cryptology
  3. Article

Batch RSA

  • Published: March 1997
  • Volume 10, pages 75–88, (1997)
  • Cite this article
Download PDF
Save article
View saved research
Journal of Cryptology Aims and scope Submit manuscript
Batch RSA
Download PDF
  • Amos Fiat1 
  • 991 Accesses

  • 55 Citations

  • 6 Altmetric

  • Explore all metrics

Abstract

We present a variant of the RSA algorithm called Batch RSA with two important properties:

  • • The cost per private operation is exponentially smaller than other number-theoretic schemes [9], [23], [22], [11], [13], [12]. In practice, the new variant effectively performs several modular exponentiations at the cost of a single modular exponentiation. This leads to a very fast RSA-like scheme whenever RSA is to be performed at some central site or when pure-RSA encryption (versus hybrid encryption) is to be performed.

  • • An additional important feature of Batch RSA is the possibility of using a distributed Batch RSA process that isolates the private key from the system, irrespective of the size of the system, the number of sites, or the number of private operations that need to be performed.

Article PDF

Download to read the full article text

Similar content being viewed by others

Further Cryptanalysis of a Type of RSA Variants

Chapter © 2022

Post-quantum RSA

Chapter © 2017

An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA)

Article 22 June 2022

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Algorithmic Complexity
  • Algorithms
  • Algorithm Analysis and Problem Complexity
  • Computational Complexity
  • Computational Number Theory
  • Discrete Mathematics in Computer Science
  • Cryptanalysis of Public Key Cryptosystems

References

  1. Abadi, M., Feigenbaum, J., and Kilian, J., On hiding information from an oracle,Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 195–203. New York City, May 25–27, 1987.

  2. Aho, A. V., Hopcroft J. E., and Ullman, J. D.,The Design and Analysis of Computer Algorithms, Addison-Wesley, Reading, MA, 1974.

    MATH  Google Scholar 

  3. Blum, M., Personal communication.

  4. Blum, M., Floyd, R. W., Pratt, V., Lewis, R. L., and Tarjan, R. E., Time bounds for selection,J. Comput. System Sci. vol. 7 pp. 448–461, 1973.

    Article  MATH  MathSciNet  Google Scholar 

  5. Yacobi, Y., and Beller, M. J., Batch Diffie-Hellman key agreement systems,Proceedings of Eurocrypt '92, pp. 208–217.

  6. Coppersmith, D., Fast evaluation of logarithms in fields of characteristic two.IEEE Trans. Inform. Theory, vol. IT-30, no. 4, pp. 587–592, July 1984.

    Article  MATH  MathSciNet  Google Scholar 

  7. Coppersmith, D., Modifications to the number field sieve, IBM Research Report #RC 16264.

  8. Chaum, D., Fiat, A., and Naor, M., Untraceable electronic cash,Proceedings of Crypto '88, pp. 319–227, 1976.

  9. Diffie, W. and Hellman, M. E., New Directions in Cryptography, IEEE Trans. Inform. Theory, vol. IT-22, 1976.

  10. Dwork, C. and Naor, M., An efficient existentially unforgeable signature scheme and its applications,Advances in Cryptology—Proceedings of Crypto'94, Lecture Notes in Computer Science, Vol. 839, Springer-Verlag, Berlin, 1994, pp. 234–346.

    Google Scholar 

  11. El Gamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms,IEEE Trans. Inform. Theory, vol. IT-31, no. 4, pp. 459–472, July 1985.

    Google Scholar 

  12. Fiat, A. and Shamir, A., How to prove yourself: Practical solutions to identification and signature problems,Advances in Cryptography—Proceedings of Crypto'86, pp. 186–194, Spinger-Verlag, Berlin, 1987.

    Google Scholar 

  13. Goldwasser, S., Micali, S., and Rivest, R. L., A digital signature scheme secure against adaptive chosen message attacks,SIAM J. Comput., vol. 17, no. 2, pp. 281–308, April 1988.

    Article  MATH  MathSciNet  Google Scholar 

  14. Guillou, L. C. and Quisquater, J. J., A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory, In:Advances in Cryptology: Proceedings of Eurocrpyt '88 (C.G. Gunther, ed.), Davos, Switzerland, May 25–27, pp. 123–128, 1988.

  15. Håstad, J., On using RSA with low exponent in a public key network,Proceedings of Crypto '85, pp. 403–408.

  16. Koblitz, N., Elliptic curve cryptosystems,Math. Comput., vol. 48, pp. 203–209, 1987.

    Article  MATH  MathSciNet  Google Scholar 

  17. Knuth, D.,The Art of Computer Programming, vol. 2:Seminumerical Algorithms, 2nd edn., Addison-Wesley, Reading, MA, 1981.

    Google Scholar 

  18. Lenstra, A. K., Lenstra, Jr., H. W., Manasse, M. S., and Pollard, J. M., The number field sieve,Proceedings of the 22nd ACM Symposium on the Theory of Computing, pp. 464–572, 1990.

  19. Menezes, A. and Vanstone, S., The implementation of elliptic curve cryptosystems, In:Advances in Cryptology—Auscrypt '90 (J. Seberry, and J. Pieprzyk, eds.), Sydney, Jan. 1990, pp. 2–13.

  20. Menezes, A., Okamoto, T., and Vanstone, S., Reducing elliptic curve logarithms to logarithms in a finite field,Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, pp. 80–89, 1991.

  21. Quisquater, J. J. and Couvreur, C., Fast decipherment algorithm for RSA public-key cryptosystem,Electronic Letters, vol. 18, no. 21, 1982, pp. 905–907.

    Article  Google Scholar 

  22. Rabin, M. O., Digitalized signatures, In:Foundations of Secure Computation, Academic Press, New York, 1978.

    Google Scholar 

  23. Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public key cryptosystems.Comm. ACM, vol. 21, no. 2, 1978.

    Google Scholar 

  24. Shamir, A., On the generation of cryptographically strong pseudorandom sequences,ACM Trans. Comput. Systems, vol. 1, no. 1, 1983.

  25. Tarjan, R. E., Amortized computational complexity.SIAM J. Algebraic Discrete Methods, vol. 2, no. 6, pp. 306–318, 1985.

    MathSciNet  Google Scholar 

  26. Wiener, M. J., Cryptoanalysis of Short RSA exponents.IEEE Trans. Inform. Theory, vol. 36, no. 3, May 1990, pp. 553–558.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science, Tel-Aviv University, Tel-Aviv, Israel

    Amos Fiat

Authors
  1. Amos Fiat
    View author publications

    Search author on:PubMed Google Scholar

Additional information

Communicated by Gilles Brassard

A preliminary version of this paper appeared inAdvances in Cryptology: Proceedings of Crypto '89, pp. 175–185. This work was performed at U.C., Berkeley, and ARL, Israel.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fiat, A. Batch RSA. J. Cryptology 10, 75–88 (1997). https://doi.org/10.1007/s001459900021

Download citation

  • Received: 05 March 1995

  • Revised: 15 April 1996

  • Issue date: March 1997

  • DOI: https://doi.org/10.1007/s001459900021

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Key words

  • RSA
  • Amortization
  • Computational complexity
  • Assymetric cryptography

Advertisement

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Footer Navigation

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover

Corporate Navigation

  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature