Authentication from matrix conjugation

نویسندگان

  • Dima Grigoriev
  • Vladimir Shpilrain
چکیده

We propose an authentication scheme where forgery (a.k.a. impersonation) seems infeasible without finding the prover’s long-term private key. The latter is equivalent to solving the conjugacy search problem in the platform (noncommutative) semigroup, i.e., to recovering X from X−1AX and A. The platform semigroup that we suggest here is the semigroup of n×n matrices over truncated multivariable polynomials over a ring.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practice Algebra Qualifying Exam Solutions

1. Let A be an n× n matrix with complex coefficients. Define trA to be the sum of the diagonal elements. Show that trA is invariant under conjugation, i.e., trA = trPAP for all invertible n× n matrices P. Proof. Let P be an invertible matrix. Let ~pk be the k-th row of P, ~qj the j-th column of P, and ~ ai the i-th column of A. The k-th row of the matrix PA is 〈~pk · ~ a1, . . . ,~pk · ~ an〉. S...

متن کامل

Cryptanalysis of matrix conjugation schemes

In this paper we cryptanalyze two protocols: GrigorievShpilrain authentication protocol and Wang et al. public key encryption protocols that use computational hardness of some variations of the conjugacy search problem in noncommutative monoids. We devise a practical heuristic algorithm solving those problems. As a conclusion we claim that these protocols are insecure for the proposed parameter...

متن کامل

Using shifted conjugacy in braid-based cryptography

Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we describe a Fiat{Shamir-style authentication protocol that be can be implemented using any binary operation that satis es the left self-distributive law. Conjugation is an example of such an operation, but there are other examples, in particular the shifted conjugation on Artin’s bra...

متن کامل

A Solution for the Allocation of Customers Authentication Methods (The Case of Multimedia Contact Center in Agriculture Bank of Iran)

In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Groups Complexity Cryptology

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2009