DocumentCode :
2625596
Title :
Exponentiation-based key generation using noncommutative groups
Author :
Sidelnikov, Vlad M.
Author_Institution :
Moscow State Univ., Russia
fYear :
1994
fDate :
27 Jun-1 Jul 1994
Firstpage :
497
Abstract :
Diffie and Hellman (1976) proposed to use exponentiation module a prime for constructing the key generation system. A security of this system is based on the supposed hardness of the following problem (A): given ηx and ηy compute ηxy. Sidelnikov, Cherepniov, and Yaschenko (1993) considered a system based on the noncommutative group G. We assume that G is a certain subgroup of the group GLn(Fp) of n×n matrices over the finite field Fp. We consider the representation of the group GLn(Fp) with the aid of exponentiation in a subsidiary cyclic group U of order p and investigate of the security of the resulting key generation systems. The group of Fq-rational point on elliptic curve and the subgroup U=⟨η⟩ of the multiplicative group of the subsidiary finite field Fq, where p|q-1, η∈Fq, ηp =1, η≠1, are the examples of the group U. We consider the group 𝒰 of affine transformations of the field Fp which is isomorphic to a certain subgroup of GL2(Fp). In this case the security of the key generation system under certain conjecture (which simplifies the task of adversary) is based on the hardness of the following problem (B): given ηxyz compute ηxyz/. It seems impossible reduce this problem to several Diffie-Hellman problems (A). The system being considered uses a universal key, which does not exist in the Diffie-Hellman system and is presumably a new element for key generation systems. The knowledge of k is supposed to be a necessary condition to compute the private key
Keywords :
cryptography; group theory; matrix algebra; cyclic group; elliptic curve; exponentiation module; exponentiation-based key generation; finite field; matrices; multiplicative group; necessary condition; noncommutative group; noncommutative groups; private key; system security; universal key; Elliptic curves; Galois fields; Public key; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory, 1994. Proceedings., 1994 IEEE International Symposium on
Conference_Location :
Trondheim
Print_ISBN :
0-7803-2015-8
Type :
conf
DOI :
10.1109/ISIT.1994.395112
Filename :
395112
Link To Document :
بازگشت