From: Amit on
On Feb 5, 1:32 am, Kristian Gjøsteen <kristiag+n...(a)math.ntnu.no>
wrote:
> The best idea I've heard is to choose a non-prime.

Are there other constructions based on composites apart from the
"deterministic Paillier method" I mentioned? If so, I'm keen to know
them as this is would be an interesting result.

From: Kristian Gj�steen on
Amit <amitabh123(a)gmail.com> wrote:
>On Feb 5, 1:32 am, Kristian Gj�steen <kristiag+n...(a)math.ntnu.no>
>wrote:
>> The best idea I've heard is to choose a non-prime.
>
>Are there other constructions based on composites apart from the
>"deterministic Paillier method" I mentioned? If so, I'm keen to know
>them as this is would be an interesting result.

This is in the context of inserting a back-door in a system. If some
party is using a defective (in a certain sense) primality test, you can
use a composite instead of a prime. Then you can solve the DLP modulo
each prime factor and combine the solution.

I believe there have been actual attacks along this line.

--
Kristian Gj�steen
From: Amit on
On Feb 26, 10:19 am, Kristian Gjøsteen <kristiag+n...(a)math.ntnu.no>
wrote:
> Amit <amitabh...(a)gmail.com> wrote:
> >On Feb 5, 1:32 am, Kristian Gjøsteen <kristiag+n...(a)math.ntnu.no>
> >wrote:
> >> The best idea I've heard is to choose a non-prime.
>
> >Are there other constructions based on composites apart from the
> >"deterministic Paillier method" I mentioned? If so, I'm keen to know
> >them as this is would be an interesting result.
>
> This is in the context of inserting a back-door in a system. If some
> party is using a defective (in a certain sense) primality test, you can
> use a composite instead of a prime. Then you can solve the DLP modulo
> each prime factor and combine the solution.
>
> I believe there have been actual attacks along this line.
>
> --
> Kristian Gjøsteen

thanks for your reply. That appears to be a "weak" cryptosystem (i.e.,
we have to keep the prime factors "small enough" for quickly computing
discrete logs)

Perhaps, a better example would be the BGN cryptosystem based on the
subgroup decision problem (however, it works only if the discrete log
is small, so not what I am looking for).
--
Amitabh