Public key authentication scheme over quaternions

被引:2
作者
Valluri, Maheswara Rao [1 ]
Narayan, Shailendra Vikash [1 ]
机构
[1] Fiji Natl Univ, Sch Math & Comp Sci, POB 7222,Derrick Campus, Suva, Fiji
关键词
Brute force attack; Authentication; Root extraction problem; Conjugacy search problem; Zero-knowledge proof; IDENTIFICATION; CRYPTOSYSTEM;
D O I
10.1080/09720529.2020.1800786
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Authentication is one of the cryptographic primitives that allows one entity to convince to another of the truth of an assertion without revealing any information other than that the assertion is true. In this paper, public key authentication scheme over quaternions modulo an RSA composite n = pq, where p and q are primes of equal size is proposed. Security of the scheme relies on the root extraction problem together with the conjugacy search problem over quaternions modulo n. Furthermore, issues related to the security, space complexity and computational cost of the scheme are discussed.
引用
收藏
页码:169 / 181
页数:13
相关论文
共 31 条
[1]  
[Anonymous], 1985, CRYPTO 84
[2]   Non-abelian key agreement protocols [J].
Anshel, I ;
Anshel, M ;
Goldfeld, D .
DISCRETE APPLIED MATHEMATICS, 2003, 130 (01) :3-12
[3]  
Anshel I, 2001, LECT NOTES COMPUT SC, V2020, P13
[4]  
Anshel I, 1999, MATH RES LETT, V6, P287
[5]   A new multiparty identification scheme based on nearring root extraction problem [J].
Arunma, M. ;
Ezhilmaran, D. .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (01) :59-64
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[8]  
Feige U., 1988, Journal of Cryptology, V1, P77, DOI 10.1007/BF02351717
[9]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194
[10]   Authentication from Matrix Conjugation [J].
Grigoriev, Dima ;
Shpilrain, Vladimir .
GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (02) :199-205