2002
DOI: 10.1007/3-540-46035-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups

Abstract: Abstract. The braid group with its conjugacy problem is one of the recent hot issues in cryptography. At CT-RSA 2001, Anshel, Anshel, Fisher, and Goldfeld proposed a commutator key agreement protocol (KAP) based on the braid groups and their colored Burau representation. Its security is based on the multiple simultaneous conjugacy problem (MSCP) plus a newly adopted key extractor. This article shows how to reduce finding the shared key of this KAP to the list-MSCPs in a permutation group and in a matrix group … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
49
0

Year Published

2003
2003
2018
2018

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 38 publications
(49 citation statements)
references
References 16 publications
0
49
0
Order By: Relevance
“…a r }, and Without the restriction x ∈ A, this would be a well-known (multiple simultaneous) conjugacy search problem. While the latter problem for braid groups is not known to have polynomial-time solution, some important recently made inroads [7], [12] suggest that it may be solved quite efficiently by a deterministic algorithm for at least some inputs, e.g. if one of the tuples g or h consists of positive braid words only.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…a r }, and Without the restriction x ∈ A, this would be a well-known (multiple simultaneous) conjugacy search problem. While the latter problem for braid groups is not known to have polynomial-time solution, some important recently made inroads [7], [12] suggest that it may be solved quite efficiently by a deterministic algorithm for at least some inputs, e.g. if one of the tuples g or h consists of positive braid words only.…”
Section: Introductionmentioning
confidence: 99%
“…In that case, the corresponding multiple simultaneous conjugacy search problem can be efficiently solved by the method of [12] (using super summit sets).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…key agreement protocol or public key encryption) [24,9,[21][22][23]13, 2] and a few ways of analyses of attacks (e.g. deterministic or empirical) [3,10,17,12,11,16,7]. A natural question is how we can proceed one more step.…”
Section: Introductionmentioning
confidence: 99%