2013
DOI: 10.1515/gcc-2013-0007
|View full text |Cite
|
Sign up to set email alerts
|

Public key exchange using matrices over group rings

Abstract: Abstract. We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform. This "nested structure" of the platform makes computation very efficient for legitimate parties. We discuss security of this scheme by addressing the Decision Diffie-Hellman (DDH) and Computational Diffie-Hellman (CDH) problems for our platform.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
47
0
5

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 67 publications
(52 citation statements)
references
References 5 publications
0
47
0
5
Order By: Relevance
“…We propose a polynomial time quantum algorithm for solving the discrete logarithm problem in matrices over finite group rings. The hardness of this problem was recently employed in the design of a key-exchange protocol proposed by D. Kahrobaei, C. Koupparis, and V. Shpilrain [4]. Our result implies that the Kahrobaei et al protocol does not belong to the realm of post-quantum cryptography.…”
mentioning
confidence: 72%
See 3 more Smart Citations
“…We propose a polynomial time quantum algorithm for solving the discrete logarithm problem in matrices over finite group rings. The hardness of this problem was recently employed in the design of a key-exchange protocol proposed by D. Kahrobaei, C. Koupparis, and V. Shpilrain [4]. Our result implies that the Kahrobaei et al protocol does not belong to the realm of post-quantum cryptography.…”
mentioning
confidence: 72%
“…2: Bob chooses a random secret b with 1 ≤ b ≤ p − 2 and sends g b mod p to Alice. 3: Alice receives g b and computes the shared key as K = (g b ) a mod p. 4: Bob receives g a and computes the shared key as K = (g a ) b mod p.…”
Section: One-time Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2016, using semidirect product of two groups, Habeeb et al [7] proposed a key exchange protocol (the HKKS protocol) based on the work of [8,9]. Unlike all the operating principles of the existing Diffie-Hellmanlike protocols, its basic passive security is based on a stronger computational group-theoretic assumption than the current assumptions of hardness of discrete logarithm problems.…”
Section: Introductionmentioning
confidence: 99%