Post-quantum commutative encryption algorithm
From MaRDI portal
homomorphismassociative algebracommutative encryptionfinite non-commutative algebrano-key protocolpost-quantum cryptoscheme
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Computational aspects of associative rings (general theory) (16Z05) Applications to coding theory and cryptography of arithmetic geometry (14G50) Endomorphism rings; matrix rings (16S50) Quantum cryptography (quantum-theoretic aspects) (81P94)
Recommendations
- Commutative encryption method based on hidden logarithm problem
- Finite non-commutative associative algebras for setting the hidden discrete logarithm problem and post-quantum cryptoschemes on its base
- Post-quantum public key-agreement scheme based on a new form of the hidden logarithm problem
- Post-quantum no-key protocol
- Post-quantum signature algorithms based on the hidden discrete logarithm problem
Cited in
(4)
This page was built for publication: Post-quantum commutative encryption algorithm
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2209515)