Decisional composite residuosity assumption

The decisional composite residuosity (DCR) assumption states that it is computationally hard to distinguish a random -th power residue modulo from a uniformly random element of , where is an RSA modulus. Introduced by Paillier as the hardness basis for an additively homomorphic encryption scheme — Pai99.

Assumption

Let for random -bit primes , and let be a random element of of order (where is Carmichael’s function). The DCR advantage of an adversary is

where is either a uniformly random -th power (i.e., for ) or a uniformly random element of , each with probability .

DCR is hard if for all efficient , is negligible.

Known Results

  • DCR implies the Paillier cryptosystem, which achieves additive homomorphism: given and , one can compute without decryption — Pai99
  • DCR follows from factoring hardnessPai99
  • The converse is open: it is not known whether DCR implies factoring
  • DCR → CPA-secure PKE with additive homomorphism — Pai99
  • DCR → COM (statistically hiding, computationally binding) — standard
  • DCR → threshold encryption (via Paillier with distributed key generation) — standard

Variations

-th Composite Residuosity

Generalizes DCR to -th powers modulo . Gives homomorphism for messages modulo .

Attacks

  • DCR is broken if factoring is easy — knowing and determines the group structure
  • Quantum attacks: Shor’s algorithm factors in polynomial time, breaking DCR — Shor97
  • No sub-exponential classical attack on DCR independent of factoring is known