Commutativity, Associativity, and Public Key Cryptography

被引:0
|
作者
Patarin, Jacques [1 ]
Nachef, Valerie [2 ]
机构
[1] Univ Paris Saclay, Lab Math Versailles, CNRS, UVSQ, F-78035 Versailles, France
[2] Univ Cergy Pontoise, Dept Math, UMR CNRS 8088, F-95000 Cergy Pontoise, France
来源
关键词
Diffie-Hellman algorithms; Chebyshev polynomials; New public key algorithms; CHEBYSHEV POLYNOMIALS; FINITE-FIELDS;
D O I
10.1007/978-3-319-76620-1_7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we will study some possible generalizations of the famous Diffie-Hellman algorithm. As we will see, at the end, most of these generalizations will not be secure or will be equivalent to some classical schemes. However, these results are not always obvious and moreover our analysis will present some interesting connections between the concepts of commutativity, associativity, and public key cryptography.
引用
收藏
页码:104 / 117
页数:14
相关论文
共 50 条
  • [21] Homotopy commutativity, homotopy associativity and power spaces
    Lin, JP
    JOURNAL OF PURE AND APPLIED ALGEBRA, 1999, 134 (02) : 133 - 162
  • [22] ASSOCIATIVITY AND COMMUTATIVITY OF ALGEBRAS OVER COMMUTATIVE RINGS
    KOH, K
    LUH, J
    PUTCHA, MS
    PACIFIC JOURNAL OF MATHEMATICS, 1976, 63 (02) : 423 - 430
  • [23] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2
  • [24] NONINTERACTIVE PUBLIC-KEY CRYPTOGRAPHY
    MAURER, UM
    YACOBI, Y
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 498 - 507
  • [25] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [26] PARTIAL INFORMATION IN PUBLIC KEY CRYPTOGRAPHY
    VYSKOC, J
    DISCRETE APPLIED MATHEMATICS, 1988, 20 (03) : 261 - 263
  • [27] An RNS public key cryptography accelerator
    Coleman, Tom A.
    Kitchener, James A.
    Pudney, David L.
    Wauchope, Kelvin D.
    Phillips, Braden J.
    SMART STRUCTURES, DEVICES, AND SYSTEMS III, 2007, 6414
  • [28] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [29] Joint Operation in Public Key Cryptography
    Vidakovic, Dragan
    Nikolic, Olivera
    Kaljevic, Jelena
    Parezanovic, Dusko
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (03) : 121 - 124
  • [30] Public key cryptography and RFID tags
    McLoone, M.
    Robshaw, M. J. B.
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 372 - +