期刊文献+

基于辫子群的密码体制研究及进展 被引量:2

Survey of braid-based cryptography
下载PDF
导出
摘要 综述了基于辫子群的密码体制的研究成果和发展状况:介绍了现有的基于辫子群的一些密码体制,包括密钥交换协议,加密—解密方案和身分认证方案,同时也概述了相关的密码分析方法,如解共轭问题、基于长度和线性表示的攻击等。指出了目前基于辫子群的密码体制所存在的问题,并对其研究前景进行了展望。 The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. The attacks against these schemes were reviewed, such as solutions to conjugacy problems, length-based attacks, and linear representation-based attacks. Some problems in the study of this field were discussed, and several hints for future work were pointed out as well.
作者 朱萍 温巧燕
出处 《通信学报》 EI CSCD 北大核心 2009年第5期105-113,共9页 Journal on Communications
基金 国家自然科学基金资助项目(60873191 60821001) 北京市自然科学基金资助项目(4072020)~~
关键词 密码体制 辫子群 共轭搜索问题 密钥交换 cryptographic scheme braid group conjugacy search problem key exchange
  • 相关文献

参考文献57

  • 1ANSHEL I, ANSHEL M, GOLDFELD D. An algebraic method for public-key cryptography[J]. Math Res Letters, 1999, 6: 287-291.
  • 2KO K H, LEE S J, CHEON J H, et al. New public-key cryptosystem using braid groups[A]. Crypto 2000[C]. Springer-Verlag, 2000. 166-184.
  • 3ANSHEL I, ANSHEL M, FISHER B, et al. New key agreement protocols in braid group cryptography[A]. CT-RSA 2001[C]. San Francisco, USA, Springer-Verlag, 2001.1-15.
  • 4CHA J C, KO K H, LEE S J, et al. An efficient implementation of braid groups[A]. Proc ASIACRYPT 2001[C]. Springer-Verlag, 2001. 144-156.
  • 5DEHORNOY P. Braid-based cryptography[J]. Contemp Math, 2004, 360: 5-33.
  • 6FRANCO N, GONZALES-MENESES J. Conjugacy problem for braid groups and Garside groups[J]. JAlgebra, 2003, 266: 112-132.
  • 7LEE E K, LEE S J, HAHN S G Pseudorandomness from braid groups[A]. Crypto 2001[C]. Springer-Verlag, 2001. 486-502.
  • 8DEHORNOY P, GIRAULT M, SIBERT H. Entity authentication schemes using braid word reduction[A]. Proc Internat Workshop Coding Crypt[C]. Versailles, 2003. 153-164.
  • 9LEE E K. Braid groups in cryptology[J]. IEICE Trans Fundamentals, 2004, E 87A(5): 986-992.
  • 10LEE S J, LEE E K. Potential weakness of the commutator key agreement protocol based on braid groups[A]. Proc EUROCRYPT 2002[C]. Springer-Verlag, 2002. 14-28.

二级参考文献11

  • 1Shor PW.Polynomial-Time algorithms for prime factorization and discrete logarithms on a quantum computer.SIAM Journal on Computing,1997,26(5):1484-1509.
  • 2Cha JC,Cheon JH,Han JW,Ko KH,Lee SJ.An efficient implementation of braid groups.In:Boyd C,ed.Advances in Cryptology-Asiacrypt 2001.LNCS 2048,Berlin:Springer-Verlag,2001.144-156.
  • 3Ko KH,Lee SJ,Cheon JH,Han JW,Kang SJ,Park CS.New public-key cryptosystem using braid groups.In:Bellare M,ed.Advances in Cryptology-CRYPTO 2000.LNCS 1880,Berlin:Springer-Verlag,2000.166-183.
  • 4Lee E,Park JH.Cryptanalysis of the public key encryption based on braid groups.In:Biham E,ed.Advances in Cryptology-EuroCrypt 2003.LNCS 2656,Berlin:Springer-Verlag,2003.477-490.
  • 5Hughes J.A linear algebraic attack on the AAFG1 braid group cryptosystem.In:Batten L,Seberry J,eds.Information Security and Privacy-7th Australian Conf.,ACISP 2002.LNCS 2384,Berlin:Springer-Verlag,2002.176-189.
  • 6Cheon JH,Jun B.A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem.In:Boneh D,ed.Advances in Cryptology-CRYPTO 2003.LNCS 2729,New York:Springer-Verlag,2003.212-225.
  • 7Hofheinz D,Steinwandt R.A practical attack on some braid group based cryptographic primitives.In:Desmedt YG,ed.Public Key Cryptography-PKC 2003.LNCS 2567,Berlin:Springer-Verlag,2003.187-198.
  • 8Dehornoy P.Braid-Based Cryptography.In:Group Theory,Statistics,and Cryptography,Contemporary Mathematics 360.New York:ACM Press,2004.5-33.
  • 9Garber D,Kaplan S,Teicher M,Tsaban B,Vishne U.Probabilistic solutions of equations in the braid group.Advances in Applied Mathematics,2005,35(3):323-334.
  • 10Lee SJ,Lee E.Potential weaknesses of the commutator key agreement protocol based on braid groups.In:Knudsen LR,ed.EUROCRYPT 2002.LNCS 2332,New York:Springer-Verlag,2002.14-28.

共引文献11

同被引文献23

  • 1丁勇,田海博,王育民.一种改进的基于辫群的签名体制[J].西安电子科技大学学报,2006,33(1):50-52. 被引量:8
  • 2汤学明,洪帆,崔国华.辫子群上的公钥加密算法[J].软件学报,2007,18(3):722-729. 被引量:12
  • 3CHAUM D.Blind signatures for untraceable payments[C] //Advances in Cryptology-Crypto.Berlin:Springer-Verlag,1983:199-203.
  • 4CAMENISCH J,PIVETEAU M,STADLER M A.Blind signatures based on the discrete logarithm problem[C] //Advances in Cryptology-EUROCRYPT.Berlin:Springer-Verlag,1995:428-432.
  • 5MOHAMMED E,EMARAH A E,SHENNAWY K E.A blind signatures scheme based on ElGamal signature[C] //Proc of the 17th National Radio Science Conference.2000:25-35.
  • 6MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Trans on Fundam,1996,E79-A(9):1338-1354.
  • 7VANDERSYPEN L M K,STEFFEN M,BRERYTA G,et al.Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance[J].Nature,2001,414(6866):883-887.
  • 8KO K H,LEE S J,CHEON J H,et al.New public-key cryptosystem using braid groups[C] //Proc of the 20th Cryptology Conference on Advances in Cryptology.Berlin:Springer-Verlag,2000:166-184.
  • 9ARTIN E.Theory of Braids[J].Annals of Math,1947,48(1):101-126.
  • 10KO K H,CHOI D H,CHO M S,et al.New signature scheme using conjugacy problem[EB/OL].(2002-11).http:// eprint.Iacr.org/2002/168.pdf.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部