Post Quantum Cryptography from Mutant Prime Knots
نویسندگان
چکیده
By resorting to basic features of topological knot theory we propose a (classical) cryptographic protocol based on the ‘difficulty’ of decomposing complex knots generated as connected sums of prime knots and their mutants. The scheme combines an asymmetric public key protocol with symmetric private ones and is intrinsecally secure against quantum eavesdropper attacks. PACS2008: 89.70.-a (Information and communication theory) 02.10.kn (Knot theory) 03.67Dd (Quantum Cryptography and communication security) MSC2010: 68QXX (Theory of computing) 57M27 (Invariants of knots and 3-manifolds) 68Q17 (Computational difficulty of problems)
منابع مشابه
NTRU Prime
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals for post-quantum lattice-based cryptography, including the classic NTRU cryptosystem and typical Ring-LWE-based cryptosystems. This paper proposes NTRU Prime, which tweaks NTRU to use rin...
متن کاملQuantum Knots and Riemann Hypothesis
In this paper we propose a quantum gauge system from which we construct generalized Wilson loops which will be as quantum knots. From quantum knots we give a classification table of knots where knots are one-to-one assigned with an integer such that prime knots are bijectively assigned with prime numbers and the prime number 2 corresponds to the trefoil knot. Then by considering the quantum kno...
متن کاملNTRU Prime: Reducing Attack Surface at Low Cost
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals for post-quantum lattice-based cryptography, including the classic NTRU cryptosystem and typical Ring-LWE-based cryptosystems. This paper (1) proposes NTRU Prime, which tweaks NTRU to use...
متن کاملDetecting knot invertibility
We discuss the consequences of the possibility that Vassiliev invariants do not detect knot invertibility as well as the fact that quantum Lie group invariants are known not to do so. On the other hand, finite group invariants, such as the set of homomorphisms from the knot group to M11, can detect knot invertibility. For many natural classes of knot invariants, including Vassiliev invariants a...
متن کاملPost-Quantum Secure Hybrid Signcryption from Lattice Assumption
Motivated by the demand to have secure signcryption scheme, even in quantum era, the concept of signcryption tag-KEM (key encapsulation machine) is extended to lattice cryptography in this paper. A lattice-based hybrid signcryption scheme is proposed by building a lattice-based signcryption tag-KEM. Based on the hardness of the learning with errors problem and the short integer solution problem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1010.2055 شماره
صفحات -
تاریخ انتشار 2010