Authentication is a process by which an entity, which could be a person or intended computer, establishes its identity to another entity. In private and public computer networks including the Internet, authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Internet business and many other transactions require a more stringent authentication process. The aim of this paper is to propose two authentication schemes based on general non-commutative rings. The key idea of the schemes is that for a given non-commutative ring; one can build polynomials on additive structure and takes them as underlying work structure. By doing so, one can implement authentica...
We propose building a new PKC in a ring structure, the classification of rings being an open problem...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
A zero-knowledge authentication scheme is a type of authentication scheme, which gives no knowledge ...
Algebra is one of the important fields of mathematics. It concerns with the study and manipulation o...
Algebra is one of the important fields of mathematics. It concerns with the study and manipulation o...
Authentication over insecure public networks or with untrusted servers raises more concerns in priva...
Authentication over insecure public networks or with untrusted servers raises more concerns in priva...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
AbstractWe propose a couple of general ways of constructing authentication schemes from actions of a...
Abstract In this paper, we propose a new signature scheme connecting two private keys and two public...
I propose the new key distribution system and attribute-based encryption scheme on non-commutative r...
We describe an authentication scheme whose security is based on the hardness of finding roots of sys...
International audienceWe propose a general way of constructing zero-knowledge authentication schemes...
We propose building a new PKC in a ring structure, the classification of rings being an open problem...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
A zero-knowledge authentication scheme is a type of authentication scheme, which gives no knowledge ...
Algebra is one of the important fields of mathematics. It concerns with the study and manipulation o...
Algebra is one of the important fields of mathematics. It concerns with the study and manipulation o...
Authentication over insecure public networks or with untrusted servers raises more concerns in priva...
Authentication over insecure public networks or with untrusted servers raises more concerns in priva...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
AbstractWe propose a couple of general ways of constructing authentication schemes from actions of a...
Abstract In this paper, we propose a new signature scheme connecting two private keys and two public...
I propose the new key distribution system and attribute-based encryption scheme on non-commutative r...
We describe an authentication scheme whose security is based on the hardness of finding roots of sys...
International audienceWe propose a general way of constructing zero-knowledge authentication schemes...
We propose building a new PKC in a ring structure, the classification of rings being an open problem...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...