2016
DOI: 10.1142/s0219498817501481
|View full text |Cite
|
Sign up to set email alerts
|

Group key management based on semigroup actions

Abstract: In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. Examples are provided that may in some cases enhance the security level and communication overheads of previous existing protocols. Security against passive attacks is considered and depends on the hardness of the semigroup action problem in any particular scenario.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…It is an active area of cryptology, where the cryptographic primitives and systems are based on algebraic structures like groups, semigroups and noncommutative rings (see [26]- [33]). This direction of security research has very rapid development (see [34], [35] and further references in these publications).…”
Section: On Cryptosystems Based On New Multivariate Platforms Of Nmentioning
confidence: 99%
“…It is an active area of cryptology, where the cryptographic primitives and systems are based on algebraic structures like groups, semigroups and noncommutative rings (see [26]- [33]). This direction of security research has very rapid development (see [34], [35] and further references in these publications).…”
Section: On Cryptosystems Based On New Multivariate Platforms Of Nmentioning
confidence: 99%
“…It is an active area of cryptology, where the cryptographic primitives and systems are based on algebraic structures like groups, semigroups and noncommutative rings (see [26]- [33]). This direction of security research has very rapid development (see [34], [35] and further references in these publications).…”
Section: On Cryptosystems Based On New Multivariate Platforms Of Nmentioning
confidence: 99%
“…The protocol below gives n users the possibility to share an initial common key built using their private keys. A proof of its correctness and security against passive attacks can be found in [2,4], assuming the Diffie-Hellman problem is hard for the given group action.…”
Section: An Initial Key Agreement Protocolmentioning
confidence: 99%
“…We will consider in particular one of the proposed initial key agreements referred to (in [4]) as IKA.2. The authors generalize these schemes in [2], considering a general action on a semigroup, and this is how IKA.2 is presented below.…”
Section: Introductionmentioning
confidence: 99%