An algebraic method for public-key cryptography
From MaRDI portal
Publication:1574733
DOI10.4310/MRL.1999.v6.n3.a3zbMath0944.94012OpenAlexW1976904648MaRDI QIDQ1574733
Michael Anshel, Dorian Goldfeld, Iris Lee Anshel
Publication date: 13 August 2000
Published in: Mathematical Research Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.4310/mrl.1999.v6.n3.a3
Related Items (86)
Public key authentication scheme over quaternions ⋮ AUTHENTICATED TRIPARTITE KEY AGREEMENT PROTOCOL USING DIGITAL SIGNATURE ALGORITHM ⋮ Efficient Authentication Scheme Based on the Twisted Near-Ring Root Extraction Problem ⋮ Reducing the Key Size of Rainbow Using Non-commutative Rings ⋮ A PTIME solution to the restricted conjugacy problem in generalized Heisenberg groups ⋮ Group ring based public key cryptosystems ⋮ Computation of centralizers in braid groups and Garside groups. ⋮ New public key cryptosystems from combinatorial group theory ⋮ Book review of: F. Bassino et al., Complexity and randomness in group theory. GAGTA book 1 ⋮ A parallel evolutionary approach to solving systems of equations in polycyclic groups ⋮ Authenticated commutator key agreement protocol ⋮ The status of polycyclic group-based cryptography: a survey and open problems ⋮ A nonlinear decomposition attack ⋮ Public key protocols over the ring \(E_{p}^{(m)}\) ⋮ Discrete logarithms for finite groups ⋮ Key agreement based on automaton groups ⋮ Algebraic generalization of Diffie-Hellman key exchange ⋮ On Eulerian semigroups of multivariate transformations and their cryptographic applications ⋮ Algebraic cryptanalysis and new security enhancements ⋮ Normal forms of random braids. ⋮ THE CONJUGACY PROBLEM IN AMALGAMATED PRODUCTS I: REGULAR ELEMENTS AND BLACK HOLES ⋮ A construction of encryption protocols over some semidirect products ⋮ Generic-case complexity, decision problems in group theory, and random walks. ⋮ On the security of DLCSP over \(\mathrm{GL}_n (\mathbb{F}_q [S_r)\)] ⋮ On one-way ring homomorphisms ⋮ Monoidal categories, representation gap and cryptography ⋮ Conjugacy problem for braid groups and Garside groups. ⋮ Some undecidability results for asynchronous transducers and the Brin-Thompson group $2V$ ⋮ Rewriting system of certain semigroups with three generators ⋮ On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups ⋮ Oblivious transfer using non-abelian groups ⋮ Non-Abelian key agreement protocols ⋮ Complexity of the generalized conjugacy problem ⋮ On the arithmetic of the endomorphisms ring \(\text{End}(\mathbb Z_p\times\mathbb Z_{p^2})\). ⋮ Affine braid groups: a better platform than braid groups for cryptology? ⋮ A linear time matrix key agreement protocol over small finite fields ⋮ Gröbner basis cryptosystems ⋮ Cryptosystems using linear groups ⋮ Combinatorial group theory and public key cryptography ⋮ Representation attacks on the Braid Diffie-Hellman public key encryption ⋮ Conjugacy search in braid groups. From a braid-based cryptogrphy point of view ⋮ The conjugacy search problem in public key cryptography: unnecessary and insufficient ⋮ Short expressions of permutations as products and cryptanalysis of the algebraic eraser ⋮ Non-associative public-key cryptography ⋮ Non-associative key establishment protocols and their implementation ⋮ Geometry of the conjugacy problem in lamplighter groups ⋮ Categorical interpretations of some key agreement protocols ⋮ GENERIC COMPLEXITY OF THE CONJUGACY PROBLEM IN HNN-EXTENSIONS AND ALGORITHMIC STRATIFICATION OF MILLER'S GROUPS ⋮ CONJUGACY OF FINITE SUBSETS IN HYPERBOLIC GROUPS ⋮ On the conjugacy search problem and left conjugacy closed loops ⋮ The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups ⋮ Key exchange protocols over noncommutative rings. The case of ⋮ On the algebraic structure of \(E_p^{(m)}\) and applications to cryptography ⋮ Conjugacy in Garside groups. I: Cyclings, powers and rigidity. ⋮ Groups With Two Generators Having Unsolvable Word Problem and Presentations of Mihailova Subgroups of Braid Groups ⋮ Entity authentication schemes using braid word reduction ⋮ Unnamed Item ⋮ Exponentially generic subsets of groups ⋮ Ironwood meta key agreement and authentication protocol ⋮ Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra ⋮ Attack on Kayawood protocol: uncloaking private keys ⋮ Properties of certain semigroups and their potential as platforms for cryptosystems ⋮ On the cycling operation in braid groups. ⋮ Efficient solutions to the braid isotopy problem. ⋮ К анализу некоторых систем открытого распределения ключей, основанных на неабелевых группах ⋮ Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography ⋮ Transitive Signatures from Braid Groups ⋮ THE CONJUGACY PROBLEM AND RELATED PROBLEMS IN LATTICE-ORDERED GROUPS ⋮ Towards generating secure keys for braid cryptography ⋮ Algebraic cryptography: new constructions and their security against provable break ⋮ Some applications of arithmetic groups in cryptography ⋮ An improved version of the AAG cryptographic protocol ⋮ Cryptanalysis of the Shpilrain-Ushakov protocol for Thompson's group ⋮ Evolution of group-theoretic cryptology attacks using hyper-heuristics ⋮ An improvement of the Diffie-Hellman noncommutative protocol ⋮ A Security Analysis of Uniformly-Layered Rainbow ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Conjugacy systems based on nonabelian factorization problems and their applications in cryptography ⋮ Signature scheme using the root extraction problem on quaternions ⋮ A new approach to the conjugacy problem in Garside groups. ⋮ Public-key cryptography and invariant theory ⋮ A novel public-key encryption scheme based on Bass cyclic units in integral group rings ⋮ New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups ⋮ A family of polycyclic groups over which the uniform conjugacy problem is NP-complete ⋮ Probabilistic solutions of equations in the braid group.
This page was built for publication: An algebraic method for public-key cryptography