Using Decision Problems in Public Key Cryptography

V. Shpilrain, Gabriel Zapata
{"title":"Using Decision Problems in Public Key Cryptography","authors":"V. Shpilrain, Gabriel Zapata","doi":"10.1515/GCC.2009.33","DOIUrl":null,"url":null,"abstract":"There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now. Most of these problems are search problems, i.e., they are of the following nature: given a property and the information that there are objects with the property , find at least one particular object with the property . So far, no cryptographic protocol based on a search problem in a non-commutative (semi)group has been recognized as secure enough to be a viable alternative to established protocols (such as RSA) based on commutative (semi)groups, although most of these protocols are more efficient than RSA is. In this paper, we suggest to use decision problems from combinatorial group theory as the core of a public key establishment protocol or a public key cryptosystem. Decision problems are problems of the following nature: given a property and an object , find out whether or not the object has the property . By using a popular decision problem, the word problem, we design a cryptosystem with the following features: (1) Bob transmits to Alice an encrypted binary sequence which Alice decrypts correctly with probability “very close” to 1; (2) the adversary, Eve, who is granted arbitrarily high (but fixed) computational speed, cannot positively identify (at least, in theory), by using a “brute force attack”, the “1” or “0” bits in Bob's binary sequence. In other words: no matter what computational speed we grant Eve at the outset, there is no guarantee that her “brute force attack” program will give a conclusive answer (or an answer which is correct with overwhelming probability) about any bit in Bob's sequence.","PeriodicalId":119576,"journal":{"name":"Groups Complex. Cryptol.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Groups Complex. Cryptol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/GCC.2009.33","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now. Most of these problems are search problems, i.e., they are of the following nature: given a property and the information that there are objects with the property , find at least one particular object with the property . So far, no cryptographic protocol based on a search problem in a non-commutative (semi)group has been recognized as secure enough to be a viable alternative to established protocols (such as RSA) based on commutative (semi)groups, although most of these protocols are more efficient than RSA is. In this paper, we suggest to use decision problems from combinatorial group theory as the core of a public key establishment protocol or a public key cryptosystem. Decision problems are problems of the following nature: given a property and an object , find out whether or not the object has the property . By using a popular decision problem, the word problem, we design a cryptosystem with the following features: (1) Bob transmits to Alice an encrypted binary sequence which Alice decrypts correctly with probability “very close” to 1; (2) the adversary, Eve, who is granted arbitrarily high (but fixed) computational speed, cannot positively identify (at least, in theory), by using a “brute force attack”, the “1” or “0” bits in Bob's binary sequence. In other words: no matter what computational speed we grant Eve at the outset, there is no guarantee that her “brute force attack” program will give a conclusive answer (or an answer which is correct with overwhelming probability) about any bit in Bob's sequence.
决策问题在公钥密码学中的应用
目前已知的几种公钥建立协议以及基于组合(半)群理论中所谓的难题的完整公钥密码体系。这些问题中的大多数都是搜索问题,也就是说,它们具有以下性质:给定一个属性和具有该属性的对象的信息,查找至少一个具有该属性的特定对象。到目前为止,还没有一个基于非交换(半)组中的搜索问题的加密协议被认为是足够安全的,可以作为基于交换(半)组的已建立的协议(如RSA)的可行替代方案,尽管大多数这些协议比RSA更有效。在本文中,我们建议使用组合群理论中的决策问题作为公钥建立协议或公钥密码体系的核心。决策问题是以下性质的问题:给定一个属性和一个对象,找出对象是否具有该属性。利用一个流行的决策问题——字问题,我们设计了一个具有以下特征的密码系统:(1)Bob向Alice传输一个加密的二进制序列,Alice以“非常接近”1的概率正确解密;(2)对手,Eve,被授予任意高(但固定)的计算速度,不能通过使用“蛮力攻击”来确定(至少在理论上)Bob二进制序列中的“1”或“0”位。换句话说:无论我们一开始给Eve多大的计算速度,都不能保证她的“蛮力攻击”程序会对Bob序列中的任何位给出一个确凿的答案(或者一个以压倒性的概率正确的答案)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信