2009
DOI: 10.1142/9789814291415_0006
|View full text |Cite
|
Sign up to set email alerts
|

Braid Group Cryptography

Abstract: In the last decade, a number of public key cryptosystems based on combinatorial group theoretic problems in braid groups have been proposed. We survey these cryptosystems and some known attacks on them.This survey includes: Basic facts on braid groups and on the Garside normal form of its elements, some known algorithms for solving the word problem in the braid group, the major public-key cryptosystems based on the braid group, and some of the known attacks on these cryptosystems. We conclude with a discussion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
15
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 70 publications
(186 reference statements)
0
15
0
Order By: Relevance
“…Unfortunately, many problems were brought to light after a thorough scrutiny carried out by pure mathematicians and cryptographers. In this section, we briefly review two of the most prominent proposals within this area and refer the interested reader to the survey on the topic by David Garber [5].…”
Section: Braid Group Cryptographymentioning
confidence: 99%
See 2 more Smart Citations
“…Unfortunately, many problems were brought to light after a thorough scrutiny carried out by pure mathematicians and cryptographers. In this section, we briefly review two of the most prominent proposals within this area and refer the interested reader to the survey on the topic by David Garber [5].…”
Section: Braid Group Cryptographymentioning
confidence: 99%
“…Let us focus on how to solve CSP and CDP. As explained in detail in [5], the basic idea that has proven more fruitful towards a solution for the CSP and CDP problems involves a set I x for each braid x (typically a subset of the conjugacy class of A), which characterizes the conjugacy class (i.e., A and B are conjugates if and only if I A = I B ). Furthermore, there should be an efficient algorithm to compute a representative ∈ I A and a witness X ∈ B n , such that X −1 AX =Â.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, we get the map Br k → Out(F k ). It is not injective (see, e.g., [8]), the kernel is generated by…”
Section: Conjugacy Classesmentioning
confidence: 99%
“…Current approaches to attain quantum-resistance include cryptography based on codes, isogenies, lattices and multivariate polynomials over finite fields [19,36,38,44]. Another approach are cryptographic systems based on non-abelian groups [22]. Indeed no quantum algorithm to solve the hidden subgroup problem (the core problem solved by Shor's algorithm for finite abelian groups) is known for general non-abelian groups.…”
Section: Introductionmentioning
confidence: 99%