To any nilpotent group of class n, one can associate a non-interactive key exchange protocol between n+1 users. The multilinear commutator maps associated to nilpotent groups play a key role in this protocol. In the present paper, we discuss the security of this key exchange when applied to finite p-groups and explore some alternative platforms, such as pro-p groups.Comment: To appear in Advances in Mathematics of Communication
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
International audienceWe provide constructions of multilinear groups equipped with natural hard prob...
With the increasing uses of internet technologies in daily life, vulnerability of personal data/info...
In Kahrobaei et al. [Multilinear cryptography using nilpotent groups, Proceedings of Elementary Theo...
In this paper, we develop a novel idea of multilinear cryptosystem using nilpotent group identities
Constructing multilinear maps has been long-standing open problem, before recently the rst construct...
This article describes a polynomial attack on the new multilinear map over the integers presented by...
We present an efficient algorithm to compute a discrete logarithm in a finite nilpotent group, or mo...
Abstract. Multilinear maps have many cryptographic applications. The first candidate construction of...
Abstract. In the last few years, cryptographic multilinear maps have proved their tremendous potenti...
We describe a cryptanalysis of the GGH15 multilinear maps. Our attack breaks in polynomial time the ...
All known multilinear map candidates have suffered from a class of attacks known as ``zeroizing\u27\...
© 2020 by the authors.In the context of new threats to Public Key Cryptography arising from a growin...
ISBN : 978-0-8218-4037-5International audienceThe purpose of the paper is to give new key agreement ...
Abstract. We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron,...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
International audienceWe provide constructions of multilinear groups equipped with natural hard prob...
With the increasing uses of internet technologies in daily life, vulnerability of personal data/info...
In Kahrobaei et al. [Multilinear cryptography using nilpotent groups, Proceedings of Elementary Theo...
In this paper, we develop a novel idea of multilinear cryptosystem using nilpotent group identities
Constructing multilinear maps has been long-standing open problem, before recently the rst construct...
This article describes a polynomial attack on the new multilinear map over the integers presented by...
We present an efficient algorithm to compute a discrete logarithm in a finite nilpotent group, or mo...
Abstract. Multilinear maps have many cryptographic applications. The first candidate construction of...
Abstract. In the last few years, cryptographic multilinear maps have proved their tremendous potenti...
We describe a cryptanalysis of the GGH15 multilinear maps. Our attack breaks in polynomial time the ...
All known multilinear map candidates have suffered from a class of attacks known as ``zeroizing\u27\...
© 2020 by the authors.In the context of new threats to Public Key Cryptography arising from a growin...
ISBN : 978-0-8218-4037-5International audienceThe purpose of the paper is to give new key agreement ...
Abstract. We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron,...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
International audienceWe provide constructions of multilinear groups equipped with natural hard prob...
With the increasing uses of internet technologies in daily life, vulnerability of personal data/info...