2022
DOI: 10.3390/math10152649
|View full text |Cite
|
Sign up to set email alerts
|

Sigma Identification Protocol Construction Based on MPF Defined over Non-Commuting Platform Group

Abstract: In this paper, we present the construction of a sigma identification protocol based on matrix power function (MPF) defined over a certain non-commuting platform group. We use the previously defined templates for generating public parameters of our protocol to overcome the problem that a two-sided MPF in general is not associative. We prove that the proposed sigma identification protocol is resistant to eavesdropping adversary attacks. Furthermore, relying on the asymptotic knowledge soundness property proven i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Previously in [9] we proposed a key exchange protocol where we used 𝕄 as a platform group for the MPF with similar templates for matrices. Also, using the ideas presented in that paper we proposed a sigma identification protocol in [10]. Here we focus on these ideas presented in a more general way, i.e.…”
Section: Mathematical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Previously in [9] we proposed a key exchange protocol where we used 𝕄 as a platform group for the MPF with similar templates for matrices. Also, using the ideas presented in that paper we proposed a sigma identification protocol in [10]. Here we focus on these ideas presented in a more general way, i.e.…”
Section: Mathematical Backgroundmentioning
confidence: 99%
“…In this paper, we consider one of such problems which is fundamental for the security of the cryptographic protocols presented in [9] and [10]. The objective of this problem is to recover the secret key of the legitimate user based on his public key [9].…”
Section: Introductionmentioning
confidence: 99%