In this paper we present a new key establishment protocol based on the decomposition problem in non-commutative groups which is: given two elements w, w_1 of the platform group G and two subgroups A, B of G (not necessarily distinct), find elements a in A, b in B such that w_1 = a w b. Here we introduce two new ideas that improve the security of key establishment protocols based on the decomposition problem. In particular, we conceal (i.e., do not publish explicitly) one of the subgroups A, B, thus introducing an additional computationally hard problem for the adversary, namely, finding the centralizer of a given finitely generated subgroup
In this paper, we presented a new key exchange method based on decomposition problem for elliptic cu...
Around two years ago, Roman\u27kov introduced a new type of attack called the nonlinear decompositio...
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003...
Known proposals for key establishment schemes based on combinatorial group theory are often formulat...
Abstract A new key agreement scheme based on the triple decomposition problem over non-commutative p...
Key management is a central problem in information security. The development of quantum computation ...
This article belongs to the Special Issue Interactions between Group Theory, Symmetry and Cryptology...
This article belongs to the Special Issue Interactions between Group Theory, Symmetry and Cryptology...
In this article, we present a new key exchange protocol which works in the division semiring. We pro...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
We examine the popular proof models for group key establishment of Bresson et al. and point out miss...
Abstract. In the security chain the weakest link is definitely the human one: human beings cannot re...
Public key encryption was first proposed by Diffie and Hellman [16], and widely popularised with the...
Public key encryption was first proposed by Diffie and Hellman [16], and widely popularised with the...
Around two years ago, Roman\u27kov introduced a new type of attack called the nonlinear decompositio...
In this paper, we presented a new key exchange method based on decomposition problem for elliptic cu...
Around two years ago, Roman\u27kov introduced a new type of attack called the nonlinear decompositio...
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003...
Known proposals for key establishment schemes based on combinatorial group theory are often formulat...
Abstract A new key agreement scheme based on the triple decomposition problem over non-commutative p...
Key management is a central problem in information security. The development of quantum computation ...
This article belongs to the Special Issue Interactions between Group Theory, Symmetry and Cryptology...
This article belongs to the Special Issue Interactions between Group Theory, Symmetry and Cryptology...
In this article, we present a new key exchange protocol which works in the division semiring. We pro...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
We examine the popular proof models for group key establishment of Bresson et al. and point out miss...
Abstract. In the security chain the weakest link is definitely the human one: human beings cannot re...
Public key encryption was first proposed by Diffie and Hellman [16], and widely popularised with the...
Public key encryption was first proposed by Diffie and Hellman [16], and widely popularised with the...
Around two years ago, Roman\u27kov introduced a new type of attack called the nonlinear decompositio...
In this paper, we presented a new key exchange method based on decomposition problem for elliptic cu...
Around two years ago, Roman\u27kov introduced a new type of attack called the nonlinear decompositio...
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003...