Redirigiendo al acceso original de articulo en 15 segundos...
ARTÍCULO
TITULO

Cryptosystems based on logarithmic signatures and covers of finite groups

Eduard Primenko    
Andrey Rybkin    

Resumen

 In this paper, we survey a cryptographic direction of post-quantum cryptography based on logarithmic signatures and covers of finite groups. These mathematical structures allows designing cryptosystems with security based on hardness of the factorization problem in finite group. This problem is assumed computationally hard even in post-quantum era. We give basic definitions and functions related to logarithmic signatures and covers of finite groups. Relations between these functions and the factorization problem in finite group are explained. We describe some logarithmic signatures generation methods and consider the hardness of the factorization problem in each case. We give a description of the existing cryptosystems based on logarithmic signatures and covers of finite groups in chronological order. These cryptographic systems applicable for such purposes as data ciphering, digital signing or pseudo random number generation. We mainly focus on cryptosystem MST3 that is the most perspective ciphering system in the direction. Description of Suzuki 2-groups traditionally used as a finite group in cryptographic system MST3 is given. A toy example of MST3 based on Suzuki 2-group is demonstrated. We also consider the main analysis results of existing cryptosystems based on logarithmic signatures and covers of finite groups.

 Artículos similares

       
 
ByeongGyu Park, Suhri Kim, Seokhie Hong, HeeSeok Kim and Seog Chung Seo    
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems ha... ver más
Revista: Applied Sciences

 
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi and Paolo Santini    
Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric cryptosystems. In particular, both correcting an error-affected codeword, and deriving the error vector cor... ver más
Revista: Algorithms

 
Fuxiao Zhou, Yanping Li and Yong Ding    
Since the roadside infrastructure and vehicles come from different manufacturers, vehicular ad hoc networks (VANETs) now are extremely heterogeneous. It is difficult to communicate securely for heterogeneous facilities in VANETs because secure communicat... ver más
Revista: Applied Sciences