Post Quantum Cryptography from Mutant Prime Knots

نویسندگان

  • Annalisa Marzuoli
  • Giandomenico Palumbo
چکیده

By resorting to basic features of topological knot theory we propose a (classical) cryptographic protocol based on the ‘difficulty’ of decomposing complex knots generated as connected sums of prime knots and their mutants. The scheme combines an asymmetric public key protocol with symmetric private ones and is intrinsecally secure against quantum eavesdropper attacks. PACS2008: 89.70.-a (Information and communication theory) 02.10.kn (Knot theory) 03.67Dd (Quantum Cryptography and communication security) MSC2010: 68QXX (Theory of computing) 57M27 (Invariants of knots and 3-manifolds) 68Q17 (Computational difficulty of problems)

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NTRU Prime

Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals for post-quantum lattice-based cryptography, including the classic NTRU cryptosystem and typical Ring-LWE-based cryptosystems. This paper proposes NTRU Prime, which tweaks NTRU to use rin...

متن کامل

Quantum Knots and Riemann Hypothesis

In this paper we propose a quantum gauge system from which we construct generalized Wilson loops which will be as quantum knots. From quantum knots we give a classification table of knots where knots are one-to-one assigned with an integer such that prime knots are bijectively assigned with prime numbers and the prime number 2 corresponds to the trefoil knot. Then by considering the quantum kno...

متن کامل

NTRU Prime: Reducing Attack Surface at Low Cost

Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals for post-quantum lattice-based cryptography, including the classic NTRU cryptosystem and typical Ring-LWE-based cryptosystems. This paper (1) proposes NTRU Prime, which tweaks NTRU to use...

متن کامل

Detecting knot invertibility

We discuss the consequences of the possibility that Vassiliev invariants do not detect knot invertibility as well as the fact that quantum Lie group invariants are known not to do so. On the other hand, finite group invariants, such as the set of homomorphisms from the knot group to M11, can detect knot invertibility. For many natural classes of knot invariants, including Vassiliev invariants a...

متن کامل

Post-Quantum Secure Hybrid Signcryption from Lattice Assumption

Motivated by the demand to have secure signcryption scheme, even in quantum era, the concept of signcryption tag-KEM (key encapsulation machine) is extended to lattice cryptography in this paper. A lattice-based hybrid signcryption scheme is proposed by building a lattice-based signcryption tag-KEM. Based on the hardness of the learning with errors problem and the short integer solution problem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1010.2055  شماره 

صفحات  -

تاریخ انتشار 2010