{"title":"自由亚元群中的丢番图密码学:理论基础","authors":"A. Myasnikov, V. Roman’kov","doi":"10.1515/gcc-2014-0011","DOIUrl":null,"url":null,"abstract":"Abstract In this paper we study so-called Diophantine cryptology, a collection of cryptographic schemes where the computational security assumptions are based on hardness of solving some Diophantine equations, and some general ideas and techniques that occur in this area. In particular, we study an interesting variation of the endomorphism problem in groups, termed the double endomorphism problem. We prove that this problem is undecidable in free metabelian groups of sufficiently large rank. We relate this result to computational security assumptions of some group-based cryptosystems. In particular, we show how to improve the Grigoriev–Shpilrain's protocol to get a new computational security assumption based on the double endomorphism problem, providing a better theoretical foundation to security.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"60 1","pages":"103 - 120"},"PeriodicalIF":0.1000,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Diophantine cryptography in free metabelian groups: Theoretical base\",\"authors\":\"A. Myasnikov, V. Roman’kov\",\"doi\":\"10.1515/gcc-2014-0011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract In this paper we study so-called Diophantine cryptology, a collection of cryptographic schemes where the computational security assumptions are based on hardness of solving some Diophantine equations, and some general ideas and techniques that occur in this area. In particular, we study an interesting variation of the endomorphism problem in groups, termed the double endomorphism problem. We prove that this problem is undecidable in free metabelian groups of sufficiently large rank. We relate this result to computational security assumptions of some group-based cryptosystems. In particular, we show how to improve the Grigoriev–Shpilrain's protocol to get a new computational security assumption based on the double endomorphism problem, providing a better theoretical foundation to security.\",\"PeriodicalId\":41862,\"journal\":{\"name\":\"Groups Complexity Cryptology\",\"volume\":\"60 1\",\"pages\":\"103 - 120\"},\"PeriodicalIF\":0.1000,\"publicationDate\":\"2014-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Groups Complexity Cryptology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1515/gcc-2014-0011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"MATHEMATICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Groups Complexity Cryptology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/gcc-2014-0011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"MATHEMATICS","Score":null,"Total":0}
Diophantine cryptography in free metabelian groups: Theoretical base
Abstract In this paper we study so-called Diophantine cryptology, a collection of cryptographic schemes where the computational security assumptions are based on hardness of solving some Diophantine equations, and some general ideas and techniques that occur in this area. In particular, we study an interesting variation of the endomorphism problem in groups, termed the double endomorphism problem. We prove that this problem is undecidable in free metabelian groups of sufficiently large rank. We relate this result to computational security assumptions of some group-based cryptosystems. In particular, we show how to improve the Grigoriev–Shpilrain's protocol to get a new computational security assumption based on the double endomorphism problem, providing a better theoretical foundation to security.