Impossibility of Three Pass Protocol using Public Abelian Groups

نویسندگان

  • Cansu Betin Onur
  • Adnan Kiliç
  • Ertan Onur
چکیده

Key transport protocols are designed to transfer a secret key from an initiating principal to other entities in a network. The three-pass protocol is a key transport protocol developed by Adi Shamir in 1980 where Alice wants to transport a secret message to Bob over an insecure channel, and they do not have any pre-shared secret information. In this paper, we prove the impossibility of secret key transportation from a principal to another entity in a network by using the three pass protocol over public Abelian groups. If it were possible to employ public Abelian groups to implement the three-pass protocol, we could use it in post-quantum cryptography for transporting keys providing information theoretic security without relying on any computationally difficult problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models

The celebrated work of Barak et al. (Crypto’01) ruled out the possibility of virtual blackbox (VBB) obfuscation for general circuits. The recent work of Canetti, Kalai, and Paneth (TCC’15) extended this impossibility to the random oracle model as well assuming the existence of trapdoor permutations (TDPs). On the other hand, the works of Barak et al. (Crypto’14) and Brakerski-Rothblum (TCC’14) ...

متن کامل

Diffie-Hellman key exchange protocol and non-abelian nilpotent groups

In this paper we study a key exchange protocol similar to DiffieHellman key exchange protocol using abelian subgroups of the automorphism group of a non-abelian nilpotent group. We also generalize group no.92 of HallSenior table [15], for arbitrary prime p and show that for those groups, the group of central automorphisms commute. We use these for the key exchange we are studying. MSC: 94A62, 2...

متن کامل

A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting

Recently non-abelian groups have attracted the attention of cryptographers for constructing public-key cryptographic protocols. In this paper we use the conjugacy problem in non-abelian groups to construct a zeroknowledge undeniable signature scheme.

متن کامل

An Eecient Protocol for Authenticated Key Agreement 1 2

This paper proposes a new and e cient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Di e-Hellman key agreement and can be modi ed to work in an arbitrary nite group and, in particular, elliptic curve groups. Two modi cations of this protocol are also presented: a one-pass authenticated key agreement protocol suitable for envir...

متن کامل

On non-normal non-abelian subgroups of finite groups

‎In this paper we prove that a finite group $G$ having at most three‎ ‎conjugacy classes of non-normal non-abelian proper subgroups is‎ ‎always solvable except for $Gcong{rm{A_5}}$‎, ‎which extends Theorem 3.3‎ ‎in [Some sufficient conditions on the number of‎ ‎non-abelian subgroups of a finite group to be solvable‎, ‎Acta Math‎. ‎Sinica (English Series) 27 (2011) 891--896.]‎. ‎Moreover‎, ‎we s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1703.06179  شماره 

صفحات  -

تاریخ انتشار 2017