[DLO24] Breaking RSA Generically Is Equivalent to Factoring, with Preprocessing
Authors: Dana Dachman-Soled, Julian Loss, Adam O’Neill | Venue: ITC 2024 | Source
Abstract
We show that in the generic ring model, breaking RSA — i.e., computing -th roots modulo — is equivalent to factoring , even when the adversary is allowed arbitrary preprocessing. Concretely, we consider adversaries that run in two phases: an unbounded preprocessing phase that produces an advice string, followed by an efficient online phase that uses the advice to break RSA. We prove that any such adversary can be converted into a factoring adversary with polynomially related online complexity and only a polynomial loss in the advice length. This rules out a superpolynomial separation between RSA and factoring in the generic ring model with preprocessing, strengthening prior results that held only for preprocessing-free adversaries.