Results 1 
8 of
8
A new key exchange protocol based on the decomposition problem
 Contemp. Math., Amer. Math. Soc
"... Abstract. In this paper we present a new key establishment protocol based on the decomposition problem in noncommutative groups which is: given two elements w, w1 of the platform group G and two subgroups A, B ⊆ G (not necessarily distinct), find elements a ∈ A, b ∈ B such that w1 = awb. Here we in ..."
Abstract

Cited by 10 (2 self)
 Add to MetaCart
Abstract. In this paper we present a new key establishment protocol based on the decomposition problem in noncommutative groups which is: given two elements w, w1 of the platform group G and two subgroups A, B ⊆ G (not necessarily distinct), find elements a ∈ A, b ∈ B such that w1 = awb. Here we introduce two new ideas that improve the security of key establishment protocols based on the decomposition problem. In particular, we conceal (i.e., do not publish explicitly) one of the subgroups A, B, thus introducing an additional computationally hard problem for the adversary, namely, finding the centralizer of a given finitely generated subgroup. 1.
Constructions in publickey cryptography over matrix groups
 Contemp. Math., Amer. Math. Soc
"... The purpose of the paper is to give new key agreement protocols (a multiparty extension of the protocol due to AnshelAnshelGoldfeld and a generalization of the DiffieHellman protocol from abelian to solvable groups) and a new homomorphic publickey cryptosystem. They rely on difficulty of the co ..."
Abstract

Cited by 9 (6 self)
 Add to MetaCart
The purpose of the paper is to give new key agreement protocols (a multiparty extension of the protocol due to AnshelAnshelGoldfeld and a generalization of the DiffieHellman protocol from abelian to solvable groups) and a new homomorphic publickey cryptosystem. They rely on difficulty of the conjugacy and membership problems for subgroups of a given group. To support these and other known cryptographic schemes we present a general technique to produce a family of instances being matrix groups (over finite commutative rings) which play a role for these schemes similar to the groups Z ∗ n in the existing cryptographic constructions like RSA or discrete logarithm. Partially supported by RFFI, grants, 030100349, NSH2251.2003.1. The paper was done during the
Secure Data Aggregation in Wireless Sensor Network: a survey
"... Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the total energy consumption of the WSNs. Consequently, data aggregation techniques c ..."
Abstract

Cited by 7 (1 self)
 Add to MetaCart
Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. However, data communication between nodes consumes a large portion of the total energy consumption of the WSNs. Consequently, data aggregation techniques can greatly help to reduce the energy consumption by eliminating redundant data traveling back to the base station. The security issues such as data integrity, confidentiality, and freshness in data aggregation become crucial when the WSN is deployed in a remote or hostile environment where sensors are prone to node failures and compromises. There is currently research potential in securing data aggregation in the WSN. With this in mind, the security issues in data aggregation for the WSN will be discussed in this paper. Then, the adversarial model that can be used in any aggregation scheme will be explained. After that, the ”stateoftheart ” proposed secure data aggregation schemes will be surveyed and then classified into two categories based on the number of aggregator nodes and the existence of the verification phase. Finally, a conceptual framework will be proposed to provide new designs with the minimum security requirements against certain type of adversary. This framework gives a better understanding of those schemes and facilitates the evaluation process.
Using decision problems in public key cryptography, preprint. http://www.sci.ccny.cuny.edu/˜shpil/wppkc.pdf Department of Mathematics, The City College of
"... Abstract. There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now. Most of these problems are search problems, i.e., they are of the following nature: given a property P and ..."
Abstract

Cited by 3 (3 self)
 Add to MetaCart
Abstract. There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now. Most of these problems are search problems, i.e., they are of the following nature: given a property P and the information that there are objects with the property P, find at least one particular object with the property P. So far, no cryptographic protocol based on a search problem in a noncommutative (semi)group has been recognized as secure enough to be a viable alternative to established protocols (such as RSA) based on commutative (semi)groups, although most of these protocols are more efficient than RSA is. In this paper, we suggest to use decision problems from combinatorial group theory as the core of a public key establishment protocol or a public key cryptosystem. Decision problems are problems of the following nature: given a property P and an object O, find out whether or not the object O has the property P. By using a popular decision problem, the word problem, we design a cryptosystem with the following features: (1) Bob transmits to Alice an encrypted binary sequence which Alice decrypts correctly with probability “very close ” to 1; (2) the adversary, Eve, who is granted arbitrarily high (but fixed) computational speed, cannot positively identify (at least, in theory), by using a “brute force attack”, the “1 ” or “0 ” bits in Bob’s binary sequence. In other words: no matter what computational speed we grant Eve at the outset, there is no guarantee that her “brute force attack ” program will give a conclusive answer (or an answer which is correct with overwhelming probability) about any bit in Bob’s sequence. 1.
Cryptanalysis of a homomorphic publickey cryptosystem
, 2006
"... The aims of this research are to give a precise description of a new homomorphic publickey encryption scheme proposed by Grigoriev and Ponomarenko [7] in 2004 and to break Grigoriev and Ponomarenko homomorphic publickey cryptosystem. Firstly, we prove some properties of linear fractional transform ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
The aims of this research are to give a precise description of a new homomorphic publickey encryption scheme proposed by Grigoriev and Ponomarenko [7] in 2004 and to break Grigoriev and Ponomarenko homomorphic publickey cryptosystem. Firstly, we prove some properties of linear fractional transformations. We analyze the Xnrepresentation algorithm which is used in the decryption scheme of Grigoriev and Ponomarenko homomorphic publickey cryptosystem and by these properties of the linear fractional transformations, we correct and modify the Xnrepresentation algorithm. We implement the modified Xnrepresentation algorithm by programming it and we prove the correctness of the modified Xnrepresentation algorithm. Secondly, we find an explicit formula to compute the X(n, S)representations of elements of the group Γn. The X(n, S)representation algorithm is used in the decryption scheme of Grigoriev and Ponomarenko homomorphic publickey cryptosystem and we modify the X(n, S)representation algorithm. We implement the modified X(n, S)representation algorithm by programming it and we justify the modified
Invariantbased Cryptosystems and Their Security Against Provable WorstCase Break ⋆
"... Abstract. Cryptography based on noncommutative algebra still suffers from lack of schemes and lack of interest. In this work, we show new constructions of cryptosystems based on group invariants and suggest methods to make such cryptosystems secure in practice. Cryptographers still cannot prove secu ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
Abstract. Cryptography based on noncommutative algebra still suffers from lack of schemes and lack of interest. In this work, we show new constructions of cryptosystems based on group invariants and suggest methods to make such cryptosystems secure in practice. Cryptographers still cannot prove security in its cryptographic sense or even reduce it to some statement about regular complexity classes. In this paper we introduce a new notion of cryptographic security, a provable break, and prove that cryptosystems based on matrix group invariants and also a variation of the AnshelAnshelGoldfeld key agreement protocol for modular groups are secure against provable worstcase break unless NP ⊆ RP. 1
Homomorphic Encryption on NonAbelian Groups and Applications
, 2002
"... Abstract Homomorphic encryption schemes on groups have been extensively studied and are important in many cryptographic protocols, such as, e. g., voting protocols. All known schemes are homomorphic on abelian groups. In this paper we initiate the study of homomorphic encryption schemes on nonabe ..."
Abstract
 Add to MetaCart
Abstract Homomorphic encryption schemes on groups have been extensively studied and are important in many cryptographic protocols, such as, e. g., voting protocols. All known schemes are homomorphic on abelian groups. In this paper we initiate the study of homomorphic encryption schemes on nonabelian groups. Our interest in nonabelian groups is motivated by the observation that a homomorphic encryption scheme on (the nonabelian) group S7, the symmetric group on seven elements, allows to construct an algebraically homomorphic encryption scheme on (Z/2Z, +, *). Whether such an algebraically homomorphic scheme exists has beenan open question for more than 20 years. We can not settle this question here either, but we suggest in this paper a homomorphic encryption scheme on S3, the first encryption scheme ona nonabelian group we are aware of. An algebraically homomorphic encryption scheme can also be obtained from a homomorphicencryption scheme on the matrix group ( SL(3, 2), *). We also give candidate families of probabilistic homomorphic embeddings of ( SL(3, 2), *) into large matrix groups that appear not tobe easily invertible by, e. g., linear algebra techniques. The techniques used in this construction may be of independent interest. Keywords: Homomorphic encryption, Computing on encrypted data, Algebraically homomorphic encryption schemes, Nonabelian groups 1 Introduction Rivest et al. asked already in 1978 in [16] for encryption schemes with additional homomorphic properties that allow for computation on encrypted data. An algebraically homomorphic encryption scheme is a homomorphic encryption scheme on (Z/2Z, +, *) and allows to compute E(x + y) and E(xy) from E(x), E(y). Such a scheme allows to evaluate general circuits on encrypted inputs. These schemes have explicitely been asked for in [5].
Algebraic cryptography: new constructions and their security against provable break ⋆
"... Abstract. Very few known cryptographic primitives are based on noncommutative algebra. Each new scheme is of substantial interest, because noncommutative constructions are secure agains many standard cryptographic attacks. On the other hand, cryptography does not provide security proofs that would a ..."
Abstract
 Add to MetaCart
Abstract. Very few known cryptographic primitives are based on noncommutative algebra. Each new scheme is of substantial interest, because noncommutative constructions are secure agains many standard cryptographic attacks. On the other hand, cryptography does not provide security proofs that would allow to base the security of a cryptographic primitive on structural complexity assumptions. Thus, it is important to investigate weaker notions of security. In this paper we introduce new constructions of cryptographic primitives based on group invariants and o er new ways to strengthen them for practical use. Besides, we introduce the notion of provable break which is a weaker version of the regular cryptographic break. In this version, an adversary should have a proof that he has correctly decyphered the message. We prove that cryptosystems based on matrix groups invariants and a version of the AnshelAnshelGoldfeld key agreement protocol for modular groups are secure against provable break unless NP = RP. 1 Algebraic cryptography Publickey cryptography, since its very beginning [16,53], has been actively employing algebraic constructions. The RSA protocol, for example, is based on number theory; the very construction of the protocol requires computing the Euler totient, ϕ(n). Its security is based