2016
DOI: 10.1090/conm/677/13623
|View full text |Cite
|
Sign up to set email alerts
|

Non-associative public-key cryptography

Abstract: We introduce a generalized Anshel-Anshel-Goldfeld (AAG) key establishment protocol (KEP) for magmas. This leads to the foundation of non-associative public-key cryptography (PKC), generalizing the concept of non-commutative PKC. We show that left selfdistributive systems appear in a natural special case of a generalized AAG-KEP for magmas, and we propose, among others instances, concrete realizations using fconjugacy in groups and shifted conjugacy in braid groups. We discuss the advantages of our schemes comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…The earliest quasigroup-based public-key cryptosystem was proposed by Koscielny and Mullen, [13]. In [14] the AAG PKC was generalized to the nonassociative algebraic structures, called the left self-distributive (LD) systems, [15,16]. In [14] Kalka used the LD-systems to define the non-associative public-key cryptographic protocol.…”
Section: Introductionmentioning
confidence: 99%
“…The earliest quasigroup-based public-key cryptosystem was proposed by Koscielny and Mullen, [13]. In [14] the AAG PKC was generalized to the nonassociative algebraic structures, called the left self-distributive (LD) systems, [15,16]. In [14] Kalka used the LD-systems to define the non-associative public-key cryptographic protocol.…”
Section: Introductionmentioning
confidence: 99%
“…As a generalization of the latter, finite semifields (i.e., finite nonassociative division rings) have been suggested as algebraic structures from which S-boxes with good cryptographic properties might be obtained [5]. This is not the first time that nonassociative structures have been considered in a cryptographic setting (just recall, for instance, [6,15,22,10]).…”
Section: Introductionmentioning
confidence: 99%
“…Shor algorithm [7] opened a quantum computing way to break current asymmetric protocols. As a response, there rise an increasing interest in some simple solutions like Lattice-based, Pairing-based, Multi Quadratic, Code-based, Hash-based, Non-Commutative and Non-Associative algebraic cryptography [1,2,[8][9][10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…A whole branch of new protocols was developed which do not rely on extended arithmetic's precision and instead exploit internal asymmetry of abstract algebraic structures like partial grupoids, categories, magmas, monoids, quasigroups, groups, rings, loops or neofields [9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24]. The new developed one-way trapdoor functions (OWTF) include conjugator search (CSP), decomposition (DP), commutative subgroup search (CSSP), symmetric decomposition (SDP) and generalized symmetric decomposition (GSDP) [9,15,17,25,26].…”
Section: Introductionmentioning
confidence: 99%