SUBSETS OF GROUPS IN PUBLIC-KEY CRYPTOGRAPHY

被引:0
|
作者
Carvalho, Andre [1 ]
Malheiro, Antonio [1 ,2 ]
机构
[1] NOVA Math, Ctr Math & Applicat, Caparica, Portugal
[2] NOVA Sch Sci & Technol, Dept Math, Caparica, Portugal
关键词
Subsets of groups; context-free languages; key-exchange; ascending HNN-extensions; CONJUGACY PROBLEM; CRYPTANALYSIS; DECIDABILITY;
D O I
10.3934/amc.2024036
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We suggest the use of algebraic subsets instead of subgroups in public-key cryptography. In particular, we present the subset version of two protocols introduced by Shpilrain and Ushakov with some examples in ascending HNN-extensions of free-abelian groups and discuss their resistance to length and distance based attacks. We also introduce several new group theoretic problems arising from this work.
引用
收藏
页码:980 / 995
页数:16
相关论文
共 50 条
  • [41] SECRET-HARDWARE PUBLIC-KEY CRYPTOGRAPHY
    KAK, SC
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1986, 133 (02): : 94 - 96
  • [42] Information Security, Mathematics, and Public-Key Cryptography
    Simon Blake-Wilson
    Designs, Codes and Cryptography, 2000, 19 : 77 - 99
  • [43] Method for realization of transformations in public-key cryptography
    P. Vasylenko Kharkiv National Technical University of Agriculture
    Telecommun Radio Eng, 2007, 17 (1559-1572):
  • [44] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [45] Secure fingerprinting using public-key cryptography
    Yoshiura, H
    Sasaki, R
    Takaragi, K
    SECURITY PROTOCOLS, 1999, 1550 : 83 - 94
  • [46] Public-key cryptography using paraunitary matrices
    Delgosha, Farshid
    Fekri, Faramarz
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (09) : 3489 - 3504
  • [47] A group theoretic approach to public-key cryptography
    Anshel, I
    Anshel, M
    Fisher, B
    Goldfeld, D
    UNUSUAL APPLICATIONS OF NUMBER THEORY, 2004, 64 : 17 - 23
  • [48] Using probabilistic argumentation for key validation in public-key cryptography
    Haenni, R
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2005, 38 (03) : 355 - 376
  • [49] Distributed Public-Key Cryptography from Weak Secrets
    Abdalla, Michel
    Boyen, Xavier
    Chevalier, Celine
    Pointcheval, David
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 139 - +
  • [50] A Petri net based public-key cryptography: PNPKC
    Ge, QW
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (06): : 1532 - 1535