Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Groups Complexity Cryptology

Managing Editor: Shpilrain, Vladimir / Weil, Pascal

Editorial Board Member: Conder, Marston / Dehornoy, Patrick / Eick, Bettina / Fine, Benjamin / Gilman, Robert / Grigoriev, Dima / Ko, Ki Hyoung / Kreuzer, Martin / Mikhalev, Alexander V. / Myasnikov, Alexei / Perret, Ludovic / Roman'kov, Vitalii / Rosenberger, Gerhard / Sapir, Mark / Thomas, Rick / Tsaban, Boaz / Capell, Enric Ventura

2 Issues per year


CiteScore 2016: 0.35

SCImago Journal Rank (SJR) 2016: 0.372
Source Normalized Impact per Paper (SNIP) 2016: 0.517

Mathematical Citation Quotient (MCQ) 2016: 0.23

Online
ISSN
1869-6104
See all formats and pricing
More options …

Using Decision Problems in Public Key Cryptography

Vladimir Shpilrain
  • Department of Mathematics, The City College of New York, New York, NY 10031, USA. , http://www.sci.ccny.cuny.edu/~shpil
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Gabriel Zapata
Published Online: 2010-02-18 | DOI: https://doi.org/10.1515/GCC.2009.33

There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by now. Most of these problems are search problems, i.e., they are of the following nature: given a property and the information that there are objects with the property , find at least one particular object with the property . So far, no cryptographic protocol based on a search problem in a non-commutative (semi)group has been recognized as secure enough to be a viable alternative to established protocols (such as RSA) based on commutative (semi)groups, although most of these protocols are more efficient than RSA is.

In this paper, we suggest to use decision problems from combinatorial group theory as the core of a public key establishment protocol or a public key cryptosystem. Decision problems are problems of the following nature: given a property and an object , find out whether or not the object has the property .

By using a popular decision problem, the word problem, we design a cryptosystem with the following features: (1) Bob transmits to Alice an encrypted binary sequence which Alice decrypts correctly with probability “very close” to 1; (2) the adversary, Eve, who is granted arbitrarily high (but fixed) computational speed, cannot positively identify (at least, in theory), by using a “brute force attack”, the “1” or “0” bits in Bob's binary sequence. In other words: no matter what computational speed we grant Eve at the outset, there is no guarantee that her “brute force attack” program will give a conclusive answer (or an answer which is correct with overwhelming probability) about any bit in Bob's sequence.

About the article

Received: 2007-10-09

Published Online: 2010-02-18

Published in Print: 2009-04-01


Citation Information: Groups – Complexity – Cryptology, ISSN (Online) 1869-6104, ISSN (Print) 1867-1144, DOI: https://doi.org/10.1515/GCC.2009.33.

Export Citation

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

[1]
[2]
P. H. Kropholler, S. J. Pride, W. A. M. Othman, K. B. Wong, and P. C. Wong
Semigroup Forum, 2010, Volume 81, Number 1, Page 172

Comments (0)

Please log in or register to comment.
Log in