Papers
Topics
Authors
Recent
Search
2000 character limit reached

RSA Accumulators in Cryptography

Updated 25 February 2026
  • RSA Accumulators are cryptographic primitives that condense sets into constant-size group elements, enabling efficient membership and non-membership proofs.
  • They rely on the strong RSA assumption and are optimized through techniques like prefix-suffix products and precomputed trees for dynamic updates.
  • RSA Accumulators are pivotal in applications such as certificate revocation, authenticated PKI, and blockchain state commitment due to their low communication overhead.

An RSA accumulator is a cryptographic primitive that compresses a set of values into a single constant-size group element, supporting efficient (non-)membership proofs with security rooted in the strong RSA assumption. The RSA accumulator is a principal example of asymmetric cryptographic accumulators and is widely deployed for privacy-preserving set-membership, verifiable data outsourcing, efficient certificate revocation, and blockchain state commitment. Its operation and performance have been formalized and optimized across several application domains (Cebe et al., 2019, Ozcelik et al., 2021, 0905.1307, B, 2020).

1. Mathematical Structure and Core Algorithms

Let kk be a security parameter (commonly $2048$ or $4096$). Initialization requires generating two strong primes p,qp,q and setting the RSA modulus N=pqN=pq. Let ϕ(N)=(p1)(q1)\phi(N)=(p-1)(q-1) (which is kept secret). Select gg randomly from the group of quadratic residues QRN\mathrm{QR}_N or from ZN\mathbb{Z}_N^*. The system’s public parameters are (N,g)(N, g), and optionally a hash-to-prime function ff for mapping arbitrary data to unique prime representatives.

Given a multiset X={x1,,xn}X = \{x_1, \ldots, x_n\}, map each xix_i to a prime ei=f(xi)e_i = f(x_i) and compute the accumulator value as

A=gi=1neimodN.A = g^{\prod_{i=1}^n e_i} \bmod N.

This construction is quasi-commutative: the resulting AA is independent of the order of accumulation due to gab=gbag^{ab} = g^{ba} (Ozcelik et al., 2021).

  • Membership Proof: To prove xiXx_i \in X, provide wi=gjiejmodNw_i = g^{\prod_{j \ne i} e_j} \bmod N. Verification: (wi)eiA(modN)(w_i)^{e_i} \equiv A \pmod N.
  • Non-Membership Proof: To prove yXy \notin X, find integers (a,b)(a, b) such that aey+bE=1a e_y + b E = 1 (via extended Euclidean algorithm with E=i=1neiE = \prod_{i=1}^n e_i), and publish (a,w=gbmodN)(a, w = g^b \bmod N). Verification: weyAag(modN)w^{e_y} \cdot A^a \equiv g \pmod N (Cebe et al., 2019, Ozcelik et al., 2021).

2. Security Properties and Assumptions

The RSA accumulator’s collision resistance is based on the strong RSA assumption: given (N,g)(N, g), it is infeasible to find (h,e>1)(h, e > 1) with heg(modN)h^e \equiv g \pmod N. A valid membership witness ww for xXx \notin X would allow computation of an ee-th root of gEg^{E}, where ee is the prime representative of xx, violating strong RSA (Ozcelik et al., 2021).

Soundness is uniquely tied to the difficulty of extracting ϕ(N)\phi(N) or producing forged roots in ZN\mathbb{Z}_N^*. Non-membership soundness requires the trapdoor ϕ(N)\phi(N); otherwise, non-membership proofs cannot be constructed, preventing adversarial removals (Cebe et al., 2019).

3. Efficient Update and Dynamic Operations

Adding an element yy (prime representative eye_y) to the accumulated set: A=AeymodNA' = A^{e_y} \bmod N. Deleting yy (requires knowledge of ϕ(N)\phi(N)): A=Aey1modϕ(N)modNA' = A^{e_y^{-1} \bmod \phi(N)} \bmod N. Witness updates propagate by raising previously computed witnesses to eye_y or ey1e_y^{-1} as appropriate. In trapdoorless (public) settings, deletions are not supported (Cebe et al., 2019, Ozcelik et al., 2021).

To accelerate membership proof computation in dynamic or large sets, several optimizations are deployed:

  • Prefix-suffix products: Compute all witnesses with O(n)O(n) multiplications and nn exponentiations (Cebe et al., 2019).
  • Precomputed trees: Two-phase tree algorithms deliver O(1)O(1) query time at the expense of O(n)O(n) update at the source (0905.1307).
  • Parameterization: Partition into pp blocks (e.g., pnp\approx\sqrt{n}), balancing source update and directory query time at O(n/p)O(n/p) (0905.1307).
  • Hierarchical accumulations: Multilevel partitions trade O(nϵ)O(n^\epsilon) performance for mixed workloads (0905.1307).

4. Complexity, Communication, and Storage

The accumulator, witnesses, and proofs remain constant size (O(λ)O(\lambda), with λ=N\lambda=|N|). Core complexities:

  • Full accumulation: O(n)O(n) prime multiplications, O(1)O(1) exponentiation.
  • Incremental add: O(1)O(1) exponentiation.
  • Witness generation: O(n)O(n) (naive) or O(1)O(1) (with precomputation or trapdoor).
  • Verification: O(1)O(1) exponentiations (Ozcelik et al., 2021, Cebe et al., 2019, 0905.1307).
  • Non-membership proof: one extended GCD and O(1)O(1) exponentiation.
  • Communication: one group element (membership), one group element plus integer (non-membership), typically $2048$ or $4096$ bits per proof.

The following table summarizes asymptotic costs for key accumulator variants (0905.1307):

Scheme Source Update Directory Query Proof Size User Verify
Naive O(1)O(1)/O(n)O(n) O(n)O(n) O(1)O(1) O(1)O(1)
Precomputed O(n)O(n) O(1)O(1) O(1)O(1) O(1)O(1)
Parameterized O(p)O(p) O(n/p)O(n/p) O(1)O(1) O(1)O(1)
Hierarchical O(nϵ)O(n^\epsilon) O(nϵ)O(n^\epsilon) O(1)O(1) O(1)O(1)

5. Applications

RSA accumulators are applied in certificate revocation, verifiable set-membership in public key infrastructures, anonymous credentials, and consensus mechanisms in blockchains.

  • Certificate Revocation: In AMI/IoT, accumulators compress thousands of revoked certificates into a single digest with per-device proofs. For n=30000n=30\,000 revoked certificates, full CRL storage is reduced from 0.69\approx 0.69 MB to 0.001\approx 0.001 MB, and distribution overheads shrink by two orders of magnitude at a cost of $9.8$ ms per modular check (Cebe et al., 2019).
  • PKI Authenticated Dictionaries: Dynamic accumulators support time-stamped, efficiently verifiable online repositories with sublinear update and query costs (0905.1307).
  • Blockchains: In securePrune, RSA accumulators succinctly commit to the UTXO set, supporting block pruning and rapid node bootstrapping. With Δs=1000Δ_s=1000, k=500k=500, storage is capped at $400$ MiB (an 85%85\% reduction) and sync times decrease by 80%80\%. Non-interactive PoE protocols embed accumulator transitions efficiently in block headers (B, 2020).

6. Construction Techniques and Parameter Choices

Prime-representative mapping (hash-to-prime) is pivotal for accumulator soundness. Generic mapping is achieved via

x=2256H2(data)+d,x = 2^{256} \cdot H_2(\text{data}) + d,

with dd minimal for xx to be prime (Cebe et al., 2019).

Modern deployments use $3072$- or $4096$-bit NN for $128$-bit classical security. Recommending prime representatives of at least $256$ bits mitigates divisor attacks (Ozcelik et al., 2021). The function ff is application-dependent and must be collision-resistant.

RSA accumulators are classified as:

  • Public: no trapdoor; only additions, larger/less efficient witnesses.
  • Private: trapdoor known; supports deletions, fast updates, but requires trust in manager.
  • Universal: both membership and non-membership proofs (requires trapdoor) (Ozcelik et al., 2021).

7. Comparative Context and Limitations

Compared with Merkle trees (hash trees) and authenticated skip lists, RSA accumulators uniquely achieve O(1)O(1)-size proofs and O(1)O(1) verification time, independent of nn (0905.1307). However, public (trapdoor-less) accumulators only support additions, whereas witness and deletion efficiency in fully dynamic settings require a trusted party holding ϕ(N)\phi(N), introducing potential vulnerabilities.

Efforts to obviate the need for private trapdoors continue, but as of these constructions, only trapdoor-based accumulators enable efficient membership and non-membership proofs for dynamic sets (Ozcelik et al., 2021).

References

  • "Communication-efficient Certificate Revocation Management for Advanced Metering Infrastructure and IoT" (Cebe et al., 2019)
  • "An Overview of Cryptographic Accumulators" (Ozcelik et al., 2021)
  • "An Efficient Dynamic and Distributed RSA Accumulator" (0905.1307)
  • "securePrune:Secure block pruning in UTXO based blockchains using Accumulators" (B, 2020)

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to RSA Accumulators.