2020
DOI: 10.3390/sym12091389
|View full text |Cite
|
Sign up to set email alerts
|

Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem

Abstract: In this paper we present a cryptographic primitive based on non-commutative cryptography. This primitive is used for key exchange protocol (KEP) construction. We prove that the security of this primitive relies on a nondeterministic polynomial complete (NP-Complete) decisional problem. Recently there are no known quantum cryptanalysis algorithms effectively solving NP-Complete problems. So far, KEPs are widely used in secure communication channel creation, e.g., in hypertext transfer protocol secure (https://)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
26
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 10 publications
(27 citation statements)
references
References 26 publications
1
26
0
Order By: Relevance
“…This assumption can be supported by our previous results presented in [11][12][13][14]. The MPF is constructed using similar algebraic structures as in [14].…”
Section: S Is a Candidate For One-way Function (Owf)supporting
confidence: 58%
See 2 more Smart Citations
“…This assumption can be supported by our previous results presented in [11][12][13][14]. The MPF is constructed using similar algebraic structures as in [14].…”
Section: S Is a Candidate For One-way Function (Owf)supporting
confidence: 58%
“…MPF, presented here, has some similarity to the certain MPF problem which was proven to be NP-complete in our previous publications [12,13]. It is believed so far that NP-complete problems cannot be effectively solved by quantum computers.…”
Section: Discussionmentioning
confidence: 57%
See 1 more Smart Citation
“…The main goal is to propose a symmetric cipher based on the conjectured one-way function (OWF). During our previous research, we proved that a certain realization of asymmetric encryption based on our function is NP-complete [13]. It is conjectured that such cryptographic primitives could be resistant to algebraic analysis and quantum cryptanalysis.…”
Section: Introductionmentioning
confidence: 80%
“…The data exchange protocol, such as keys between entities with accountable optimistic fair exchange protocol, was also utilized in [14]. Data exchange protocols (e.g., cryptographic keys) are protected by other methods, including Non-Commuting Group based on an NP-complete decisional problem as described in [15] and Multi-Stage Quantum in [16]. However, the previous studies do not validate the security requirements of their research by utilizing the formal security validation tools (e.g., Scyther, AVISPA, Tamarin Proofer).…”
Section: Introductionmentioning
confidence: 99%