Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Diophantine cryptography in free metabelian groups: Theoretical base

Diophantine cryptography in free metabelian groups: Theoretical base Abstract In this paper we study so-called Diophantine cryptology, a collection of cryptographic schemes where the computational security assumptions are based on hardness of solving some Diophantine equations, and some general ideas and techniques that occur in this area. In particular, we study an interesting variation of the endomorphism problem in groups, termed the double endomorphism problem . We prove that this problem is undecidable in free metabelian groups of sufficiently large rank. We relate this result to computational security assumptions of some group-based cryptosystems. In particular, we show how to improve the Grigoriev–Shpilrain's protocol to get a new computational security assumption based on the double endomorphism problem, providing a better theoretical foundation to security. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Groups Complexity Cryptology de Gruyter

Diophantine cryptography in free metabelian groups: Theoretical base

Loading next page...
 
/lp/de-gruyter/diophantine-cryptography-in-free-metabelian-groups-theoretical-base-lvtDOLTv0y
Publisher
de Gruyter
Copyright
Copyright © 2014 by the
ISSN
1867-1144
eISSN
1869-6104
DOI
10.1515/gcc-2014-0011
Publisher site
See Article on Publisher Site

Abstract

Abstract In this paper we study so-called Diophantine cryptology, a collection of cryptographic schemes where the computational security assumptions are based on hardness of solving some Diophantine equations, and some general ideas and techniques that occur in this area. In particular, we study an interesting variation of the endomorphism problem in groups, termed the double endomorphism problem . We prove that this problem is undecidable in free metabelian groups of sufficiently large rank. We relate this result to computational security assumptions of some group-based cryptosystems. In particular, we show how to improve the Grigoriev–Shpilrain's protocol to get a new computational security assumption based on the double endomorphism problem, providing a better theoretical foundation to security.

Journal

Groups Complexity Cryptologyde Gruyter

Published: Nov 1, 2014

There are no references for this article.