Authentication from matrix conjugation
نویسندگان
چکیده
We propose an authentication scheme where forgery (a.k.a. impersonation) seems infeasible without finding the prover’s long-term private key. The latter is equivalent to solving the conjugacy search problem in the platform (noncommutative) semigroup, i.e., to recovering X from X−1AX and A. The platform semigroup that we suggest here is the semigroup of n×n matrices over truncated multivariable polynomials over a ring.
منابع مشابه
Practice Algebra Qualifying Exam Solutions
1. Let A be an n× n matrix with complex coefficients. Define trA to be the sum of the diagonal elements. Show that trA is invariant under conjugation, i.e., trA = trPAP for all invertible n× n matrices P. Proof. Let P be an invertible matrix. Let ~pk be the k-th row of P, ~qj the j-th column of P, and ~ ai the i-th column of A. The k-th row of the matrix PA is 〈~pk · ~ a1, . . . ,~pk · ~ an〉. S...
متن کاملCryptanalysis of matrix conjugation schemes
In this paper we cryptanalyze two protocols: GrigorievShpilrain authentication protocol and Wang et al. public key encryption protocols that use computational hardness of some variations of the conjugacy search problem in noncommutative monoids. We devise a practical heuristic algorithm solving those problems. As a conclusion we claim that these protocols are insecure for the proposed parameter...
متن کاملUsing shifted conjugacy in braid-based cryptography
Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we describe a Fiat{Shamir-style authentication protocol that be can be implemented using any binary operation that satis es the left self-distributive law. Conjugation is an example of such an operation, but there are other examples, in particular the shifted conjugation on Artin’s bra...
متن کاملA Solution for the Allocation of Customers Authentication Methods (The Case of Multimedia Contact Center in Agriculture Bank of Iran)
In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Groups Complexity Cryptology
دوره 1 شماره
صفحات -
تاریخ انتشار 2009