2009
DOI: 10.1515/gcc.2009.33
|View full text |Cite
|
Sign up to set email alerts
|

Using Decision Problems in Public Key Cryptography

Abstract: There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now.Most of these problems are search problems, i.e., they are of the following nature: given a property P and the information that there are objects with the property P, find at least one particular object with the property P. So far, no cryptographic protocol based on a search problem in a non-commutative (semi)group has been recogni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
(23 reference statements)
0
3
0
Order By: Relevance
“…Furthermore, given a finite presentation one can easily check whether or not it satisfies the small cancellation property: all one needs to do is to inspect all pairs of relators for a common segment of critical length. For these reasons small cancellation groups were suggested as a platform for computation in several cryptographic protocols (see [11,12,4,7]).…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, given a finite presentation one can easily check whether or not it satisfies the small cancellation property: all one needs to do is to inspect all pairs of relators for a common segment of critical length. For these reasons small cancellation groups were suggested as a platform for computation in several cryptographic protocols (see [11,12,4,7]).…”
Section: Introductionmentioning
confidence: 99%
“…As LBAs became also increasingly capable of solving instances of the aforementioned KEPs, researchers began, in a search for more attack-resistant structures, to look for new groups and problems while keeping the general methodology. Examples of these platform groups are right-angled Artin groups [12] (a homomorphic pre-image of braid groups), small cancellation groups [40], matrix groups, Thompson's group and Grigorchuk's group, to name but a few.…”
Section: Introductionmentioning
confidence: 99%
“…At the same time, the last 15-20 years are marked by a rapid progress in algebraic cryptography using as encryption platforms the following abstract algebraic systems: algebras, groups, loops, and so on (see monographs [5,6], review papers [7][8][9][10][11][12], a collection of preprints [13]). For the classical Diffie-Hellman, Massey-Omura, ElGamal protocols, and others, analogs were obtained primarily in cryptography founded on group theory.…”
Section: Introductionmentioning
confidence: 99%