The Status of Polycyclic Group-Based Cryptography: A Survey and Open Problems
نویسندگان
چکیده
Polycyclic groups are natural generalizations of cyclic groups but with more complicated algorithmic properties. They are finitely presented and the word, conjugacy, and isomorphism decision problems are all solvable in these groups. Moreover, the non-virtually nilpotent ones exhibit an exponential growth rate. These properties make them suitable for use in group-based cryptography, which was proposed in 2004 by Eick and Kahrobaei [10]. Since then, many cryptosystems have been created that employ polycyclic groups. These include key exchanges such as non-commutative ElGamal, authentication schemes based on the twisted conjugacy problem, and secret sharing via the word problem. In response, heuristic and deterministic methods of cryptanalysis have been developed, including the length-based and linear decomposition attacks. Despite these efforts, there are classes of infinite polycyclic groups that remain suitable for cryptography. The analysis of algorithms for search and decision problems in polycyclic groups has also been developed. In addition to results for the aforementioned problems we present those concerning polycyclic representations, group morphisms, and orbit decidability. Though much progress has been made, many algorithmic and complexity problems remain unsolved; we conclude with a number of them. Of particular interest is to show that cryptosystems using infinite polycyclic groups are resistant to cryptanalysis on a quantum computer.
منابع مشابه
Responsive Urban Space Special Need Group (Women), Case study: Chizar Neighborhood Space, Tehran, Iran
Based on a gender equity perspective and within a pluralistic civil society, women should have equal rights for presence in and use of urban open spaces. Despite this, various factors decrease their presence including inappropriate design of space, as well as socio-cultural obstacles. Since women’s major place of presence and activity has traditionally been in or near home, neighborhood open s...
متن کاملThe effect of strengthening and balance exercises on static stability indices in women with knee osteoarthritis (a randomized clinical trial)
Objective and Background: Knee osteoarthritis is one of the most common musculoskeletal problems that is associated with impaired balance. The objective of this study was to investigate the effect of strengthening and balance on static stability indices in female with knee osteoarthritis. Materials and Methods: In this randomized controlled single-blind clinical trial, 13 women with knee oste...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملSocioeconomic Disparities and Self-reported Substance Abuse-related Problems
Background: It is not well understood whether the self-reported experience of substance abuse-related problems differs by socioeconomic status.Methods: We conducted a secondary analysis using the 2013 National Survey on Drug Use and Health (NSDUH) on participants who reported ever using illicit drugs or used illicit drugs in the past year.Findings: Among those reporting ever using illicit drugs...
متن کاملEEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Groups Complexity Cryptology
دوره 8 شماره
صفحات -
تاریخ انتشار 2016