SUBSETS OF GROUPS IN PUBLIC-KEY CRYPTOGRAPHY

被引:0
|
作者
Carvalho, Andre [1 ]
Malheiro, Antonio [1 ,2 ]
机构
[1] NOVA Math, Ctr Math & Applicat, Caparica, Portugal
[2] NOVA Sch Sci & Technol, Dept Math, Caparica, Portugal
关键词
Subsets of groups; context-free languages; key-exchange; ascending HNN-extensions; CONJUGACY PROBLEM; CRYPTANALYSIS; DECIDABILITY;
D O I
10.3934/amc.2024036
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We suggest the use of algebraic subsets instead of subgroups in public-key cryptography. In particular, we present the subset version of two protocols introduced by Shpilrain and Ushakov with some examples in ascending HNN-extensions of free-abelian groups and discuss their resistance to length and distance based attacks. We also introduce several new group theoretic problems arising from this work.
引用
收藏
页码:980 / 995
页数:16
相关论文
共 50 条
  • [31] Public-Key Cryptography from Different Assumptions
    Applebaum, Benny
    Barak, Boaz
    Wigderson, Avi
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 171 - 180
  • [32] Public-key cryptography for RFID-tags
    Batina, L.
    Guajardo, J.
    Kerins, T.
    Mentens, N.
    Tuyls, P.
    Verbauwhede, I.
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 217 - +
  • [33] The Magic of Elliptic Curves and Public-Key Cryptography
    Florian Heß
    Andreas Stein
    Sandra Stein
    Manfred Lochter
    Jahresbericht der Deutschen Mathematiker-Vereinigung, 2012, 114 (2) : 59 - 88
  • [34] Information security, mathematics, and public-key cryptography
    Blake-Wilson, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 77 - 99
  • [35] Inverse matrices with applications in public-key cryptography
    Makoui, Farshid Haidary
    Gulliver, Thomas Aaron
    JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2024, 18
  • [36] PUBLIC-KEY CRYPTOGRAPHY - FROM THEORY TO STANDARD
    TEREKHOV, AN
    TISKIN, AV
    PROGRAMMING AND COMPUTER SOFTWARE, 1994, 20 (05) : 189 - 192
  • [37] Computational Thinking Enrichment: Public-Key Cryptography
    Rosamond, Frances
    INFORMATICS IN EDUCATION, 2018, 17 (01): : 93 - 103
  • [38] An-algebraic method for public-key cryptography
    Anshel, I
    Anshel, M
    Goldfeld, D
    MATHEMATICAL RESEARCH LETTERS, 1999, 6 (3-4) : 287 - 291
  • [39] RFID privacy based on public-key cryptography
    Vaudenay, Serge
    Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 1 - 6
  • [40] PUBLIC-KEY CRYPTOGRAPHY AND OPEN SYSTEMS INTERCONNECTION
    FORD, W
    OHIGGINS, B
    IEEE COMMUNICATIONS MAGAZINE, 1992, 30 (07) : 30 - 35