Aspects of nonabelian group based cryptography: a survey and open problems
From MaRDI portal
Publication:3015239
Abstract: Most common public key cryptosystems and public key exchange protocols presently in use, such as the RSA algorithm, Diffie-Hellman, and elliptic curve methods are number theory based and hence depend on the structure of abelian groups. The strength of computing machinery has made these techniques theoretically susceptible to attack and hence recently there has been an active line of research to develop cryptosystems and key exchange protocols using noncommutative cryptographic platforms. This line of investigation has been given the broad title of noncommutative algebraic cryptography. This was initiated by two public key protocols that used the braid groups, one by Ko, Lee et.al.and one by Anshel, Anshel and Goldfeld. The study of these protocols and the group theory surrounding them has had a large effect on research in infinite group theory. In this paper we survey these noncommutative group based methods and discuss several ideas in abstract infinite group theory that have arisen from them. We then present a set of open problems.
Recommendations
Cited in
(23)- Diophantine cryptography over infinite groups
- scientific article; zbMATH DE number 2156406 (Why is no real title available?)
- On Eulerian semigroups of multivariate transformations and their cryptographic applications
- Non-associative public-key cryptography
- Cryptographic algorithms on groups and algebras
- On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
- Cryptographic protocols based on inner product spaces and group theory with a special focus on the use of Nielsen transformations
- Some cryptoprimitives in noncommutative algebraic cryptography
- scientific article; zbMATH DE number 5982274 (Why is no real title available?)
- The status of polycyclic group-based cryptography: a survey and open problems
- Group theoretic cryptography
- Group-based cryptography
- Oblivious transfer using non-abelian groups
- A short biography of Ben Fine
- A survey of group-based cryptography
- The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups
- Неабелевость группы наложения ключа и свойство $\otimes _{\mathbf{W}}$-марковости алгоритмов блочного шифрования
- Comparing finite abelian groups from the standpoint of their cryptographic applications
- Cryptanalysis of the CLR-cryptosystem
- Linear decomposition method in analyzing hidden information protocols on algebraic platforms
- Cryptanalysis via algebraic spans
- Designing key transport protocols using combinatorial group theory
- Decision and search in non-abelian Cramer-Shoup public key cryptosystem
This page was built for publication: Aspects of nonabelian group based cryptography: a survey and open problems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3015239)