Public key protocols over the ring E_p^(m)
From MaRDI portal
Publication:340183
Abstract: In this paper we use the nonrepresentable ring E_p(m)to introduce public key cryptosystems in noncommutative settings and based on the Semigrouop Action Problem and the Decomposition Problem respectively.
Recommendations
- Cryptanalysis of a key exchange protocol based on the ring \(E_p^{(m)}\)
- scientific article; zbMATH DE number 176555
- scientific article; zbMATH DE number 2196515
- scientific article; zbMATH DE number 1588480
- Public key cryptography based on semimodules over quotient semirings
- Public key exchange using matrices over group rings
- Practical private-key fully homomorphic encryption in rings
- On the application of rings of integer algebraic numbers to the construction of public-key cryptoschemes
- Key exchange protocols over noncommutative rings. The case of End(\(\mathbb Z_p \times \mathbb Z_{p^{2}}\))
- A public-key cryptosystem based on the group rings
Cites work
- scientific article; zbMATH DE number 1612499 (Why is no real title available?)
- scientific article; zbMATH DE number 1617914 (Why is no real title available?)
- scientific article; zbMATH DE number 738921 (Why is no real title available?)
- scientific article; zbMATH DE number 1759777 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 1842507 (Why is no real title available?)
- scientific article; zbMATH DE number 774344 (Why is no real title available?)
- A Simple Generalization of the ElGamal Cryptosystem to Non-Abelian Groups
- A method for obtaining digital signatures and public-key cryptosystems
- A new key exchange protocol based on the decomposition problem
- A nonlinear elliptic curve cryptosystem based on matrices
- A public key cryptosystem and a signature scheme based on discrete logarithms
- An algebraic method for public-key cryptography
- An extension of the noncommutative Bergman's ring with a large number of noninvertible elements
- Are matrices useful in public-key cryptography?
- Combinatorial group theory and public key cryptography
- Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\)
- Group-based cryptography
- Key exchange protocols over noncommutative rings. The case of End(\(\mathbb Z_p \times \mathbb Z_{p^{2}}\))
- New directions in cryptography
- On the arithmetic of the endomorphisms ring \(\text{End}(\mathbb Z_p\times\mathbb Z_{p^2})\).
- Public key cryptography based on semigroup actions
- Some examples in PI ring theory
- The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups
- The MOR cryptosystem and finite \(p\)-groups
- Towards generating secure keys for braid cryptography
Cited in
(6)- Group key management based on semigroup actions
- On the algebraic structure of \(E_p^{(m)}\) and applications to cryptography
- Cryptanalysis of the CLR-cryptosystem
- scientific article; zbMATH DE number 7013323 (Why is no real title available?)
- scientific article; zbMATH DE number 7156413 (Why is no real title available?)
- Public key cryptography based on Moufang loops
This page was built for publication: Public key protocols over the ring \(E_{p}^{(m)}\)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q340183)