scientific article; zbMATH DE number 1759777
From MaRDI portal
Publication:4536800
zbMath0995.94531MaRDI QIDQ4536800
Ki Hyoung Ko, Choonsik Park, Jung Hee Cheon, Sang Jin Lee, Jae Woo Han, Ju-Sung Kang
Publication date: 7 October 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
public key cryptosystemone-way functionbraid groupconjugacy problempublic key infrastructurenon-commutative groupkey exchangehard problem
Related Items (89)
Public key authentication scheme over quaternions ⋮ A unique key sharing protocol among three users using non-commutative group for electronic health record system ⋮ Novel Digital Signature Scheme with Multiple Private Keys on Non-commutative Division Semirings ⋮ Reducing the Key Size of Rainbow Using Non-commutative Rings ⋮ A PTIME solution to the restricted conjugacy problem in generalized Heisenberg groups ⋮ Computation of centralizers in braid groups and Garside groups. ⋮ New public key cryptosystems from combinatorial group theory ⋮ Quantum lattice enumeration and tweaking discrete pruning ⋮ Geometry and Combinatorics via Right-Angled Artin Groups ⋮ Public key cryptography based on Moufang loops ⋮ A parallel evolutionary approach to solving systems of equations in polycyclic groups ⋮ Authenticated commutator key agreement protocol ⋮ The status of polycyclic group-based cryptography: a survey and open problems ⋮ A nonlinear decomposition attack ⋮ Public key protocols over the ring \(E_{p}^{(m)}\) ⋮ The conjugacy problem in free solvable groups and wreath products of abelian groups is in \({\mathsf {TC}^0}\) ⋮ Combinatorics of normal sequences of braids ⋮ Matrix PRFs: constructions, attacks, and applications to obfuscation ⋮ Cryptanalysis of a combinatorial public key cryptosystem ⋮ Unnamed Item ⋮ Algebraic generalization of Diffie-Hellman key exchange ⋮ On Eulerian semigroups of multivariate transformations and their cryptographic applications ⋮ Normal forms of random braids. ⋮ A construction of encryption protocols over some semidirect products ⋮ On the security of DLCSP over \(\mathrm{GL}_n (\mathbb{F}_q [S_r)\)] ⋮ Full quantum equivalence of group action DLog and CDH, and more ⋮ Monoidal categories, representation gap and cryptography ⋮ Conjugacy problem for braid groups and Garside groups. ⋮ Some undecidability results for asynchronous transducers and the Brin-Thompson group $2V$ ⋮ Rewriting system of certain semigroups with three generators ⋮ On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups ⋮ Oblivious transfer using non-abelian groups ⋮ Non-Abelian key agreement protocols ⋮ Complexity of the generalized conjugacy problem ⋮ On the arithmetic of the endomorphisms ring \(\text{End}(\mathbb Z_p\times\mathbb Z_{p^2})\). ⋮ Affine braid groups: a better platform than braid groups for cryptology? ⋮ Gröbner basis cryptosystems ⋮ Cryptosystems using linear groups ⋮ Homomorphic public-key cryptosystems and encrypting Boolean circuits ⋮ Combinatorial group theory and public key cryptography ⋮ Representation attacks on the Braid Diffie-Hellman public key encryption ⋮ Conjugacy search in braid groups. From a braid-based cryptogrphy point of view ⋮ The conjugacy search problem in public key cryptography: unnecessary and insufficient ⋮ Short expressions of permutations as products and cryptanalysis of the algebraic eraser ⋮ Non-associative public-key cryptography ⋮ Geometry of the conjugacy problem in lamplighter groups ⋮ Categorical interpretations of some key agreement protocols ⋮ Towards practical key exchange from ordinary isogeny graphs ⋮ Testing graph isotopy on surfaces ⋮ On the conjugacy search problem and left conjugacy closed loops ⋮ The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups ⋮ GENERAL ALGEBRAIC CRYPTOGRAPHIC KEY EXCHANGE SCHEME AND ITS CRYPTANALYSIS ⋮ Linear decomposition method in analyzing hidden information protocols on algebraic platforms ⋮ Key exchange protocols over noncommutative rings. The case of ⋮ On the algebraic structure of \(E_p^{(m)}\) and applications to cryptography ⋮ Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\) ⋮ Groups With Two Generators Having Unsolvable Word Problem and Presentations of Mihailova Subgroups of Braid Groups ⋮ Entity authentication schemes using braid word reduction ⋮ Weak keys in MST\(_{1}\) ⋮ A weak key test for braid based cryptography. ⋮ Algorithmic problems in Engel groups and cryptographic applications ⋮ Ironwood meta key agreement and authentication protocol ⋮ A key exchange protocol using matrices over group ring ⋮ Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra ⋮ Attack on Kayawood protocol: uncloaking private keys ⋮ Properties of certain semigroups and their potential as platforms for cryptosystems ⋮ Laver's results and low-dimensional topology ⋮ Efficient solutions to the braid isotopy problem. ⋮ К анализу некоторых систем открытого распределения ключей, основанных на неабелевых группах ⋮ Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography ⋮ Transitive Signatures from Braid Groups ⋮ Towards generating secure keys for braid cryptography ⋮ Normal forms in braid groups with respect to some Gröbner–Shirshov basis ⋮ Some applications of arithmetic groups in cryptography ⋮ An infinite family of braid group representations in automorphism groups of free groups ⋮ Cryptanalysis of the Shpilrain-Ushakov protocol for Thompson's group ⋮ Evolution of group-theoretic cryptology attacks using hyper-heuristics ⋮ The conjugacy problem in free solvable groups and wreath products of abelian groups is in \(\mathsf{TC}^0\) ⋮ An improvement of the Diffie-Hellman noncommutative protocol ⋮ Two general schemes of algebraic cryptography ⋮ A Security Analysis of Uniformly-Layered Rainbow ⋮ Conjugacy systems based on nonabelian factorization problems and their applications in cryptography ⋮ Signature scheme using the root extraction problem on quaternions ⋮ A new approach to the conjugacy problem in Garside groups. ⋮ Public-key cryptography and invariant theory ⋮ On non-Abelian homomorphic public-key cryptosystems ⋮ Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family ⋮ New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups ⋮ Probabilistic solutions of equations in the braid group.
This page was built for publication: