Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Groups Complexity Cryptology

Managing Editor: Shpilrain, Vladimir / Weil, Pascal

Editorial Board: Conder, Marston / Dehornoy, Patrick / Eick, Bettina / Fine, Benjamin / Gilman, Robert / Grigoriev, Dima / Ko, Ki Hyoung / Kreuzer, Martin / Mikhalev, Alexander V. / Myasnikov, Alexei / Perret, Ludovic / Roman'kov, Vitalii / Rosenberger, Gerhard / Sapir, Mark / Thomas, Rick / Tsaban, Boaz / Capell, Enric Ventura

2 Issues per year


CiteScore 2017: 0.32

SCImago Journal Rank (SJR) 2017: 0.208
Source Normalized Impact per Paper (SNIP) 2017: 0.322

Mathematical Citation Quotient (MCQ) 2017: 0.32

Online
ISSN
1869-6104
See all formats and pricing
More options …

Public key exchange using matrices over group rings

Delaram Kahrobaei / Charalambos Koupparis / Vladimir Shpilrain
Published Online: 2013-05-02 | DOI: https://doi.org/10.1515/gcc-2013-0007

Abstract.

We offer a public key exchange protocol in the spirit of Diffie–Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform. This “nested structure” of the platform makes computation very efficient for legitimate parties. We discuss security of this scheme by addressing the Decision Diffie–Hellman (DDH) and Computational Diffie–Hellman (CDH) problems for our platform.

Keywords: Public key exchange; Diffie–Hellman; group ring

About the article

Received: 2012-08-05

Published Online: 2013-05-02

Published in Print: 2013-05-01


Citation Information: Groups - Complexity - Cryptology, Volume 5, Issue 1, Pages 97–115, ISSN (Online) 1869-6104, ISSN (Print) 1867-1144, DOI: https://doi.org/10.1515/gcc-2013-0007.

Export Citation

© 2013 by Walter de Gruyter Berlin Boston.Get Permission

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

[1]
Jing Li, Licheng Wang, Lihua Wang, Xianmin Wang, Zhengan Huang, and Jin Li
Concurrency and Computation: Practice and Experience, 2018, Page e4523
[2]
Indivar Gupta, Atul Pandey, and Manish Kant Dubey
Asian-European Journal of Mathematics, 2018, Page 1950075
[3]
Jia Wang, Lee-Ming Cheng, and Tong Su
IEEE Transactions on Neural Networks and Learning Systems, 2018, Volume 29, Number 2, Page 353
[4]
Jun Yang, Jian-Hua Zhang, L. Long, Y. Li, X. Li, Y. Dai, and H. Yang
ITM Web of Conferences, 2017, Volume 12, Page 03039
[5]
Shamsa Kanwal and Rashid Ali
Neural Computing and Applications, 2016
[6]
Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang, and Zhiguo Qu
Science China Information Sciences, 2017, Volume 60, Number 5
[7]
Zeev Dvir and Sivakanth Gopi
Journal of the ACM, 2016, Volume 63, Number 4, Page 1
[8]
Matan Banin and Boaz Tsaban
Designs, Codes and Cryptography, 2016, Volume 81, Number 1, Page 75
[9]

Comments (0)

Please log in or register to comment.
Log in