Entropoid Based Cryptography

04/12/2021
by   Danilo Gligoroski, et al.
0

By analogy with the developed cryptographic theory of discrete logarithm problems, we define several hard problems in Entropoid based cryptography, such as Discrete Entropoid Logarithm Problem (DELP), Computational Entropoid Diffie-Hellman problem (CEDHP), and Decisional Entropoid Diffie-Hellman Problem (DEDHP). We post a conjecture that DEDHP is hard in Sylow q-subquasigroups. Next, we instantiate an entropoid Diffie-Hellman key exchange protocol. Due to the non-commutativity and non-associativity, the entropoid based cryptographic primitives are supposed to be resistant to quantum algorithms. At the same time, due to the proposed succinct notation for the power indices, the communication overhead in the entropoid based Diffie-Hellman key exchange is very low: for 128 bits of security, 64 bytes in total are communicated in both directions, and for 256 bits of security, 128 bytes in total are communicated in both directions. Our final contribution is in proposing two entropoid based digital signature schemes. The schemes are constructed with the Fiat-Shamir transformation of an identification scheme which security relies on a new hardness assumption: computing roots in finite entropoids is hard. If this assumption withstands the time's test, the first proposed signature scheme has excellent properties: for the classical security levels between 128 and 256 bits, the public and private key sizes are between 32 and 64, and the signature sizes are between 64 and 128 bytes. The second signature scheme reduces the finding of the roots in finite entropoids to computing discrete entropoid logarithms. In our opinion, this is a safer but more conservative design, and it pays the price in doubling the key sizes and the signature sizes. We give a proof-of-concept implementation in SageMath 9.2 for all proposed algorithms and schemes in an appendix.

READ FULL TEXT

page 3

page 10

page 31

page 32

page 33

research
02/24/2023

Smaller public keys for MinRank-based schemes

MinRank is an NP-complete problem in linear algebra whose characteristic...
research
09/08/2022

Multi-signer Strong Designated Multi-verifier Signature Schemes based on Multiple Cryptographic Algorithms

A designated verifier signature scheme allows a signer to generate a sig...
research
05/06/2022

Public key cryptography based on skew dihedral group rings

In this paper, we propose to use a skew dihedral group ring given by the...
research
11/16/2020

Cryptanalysis of a code-based full-time signature

We present an attack against a code-based signature scheme based on the ...
research
10/13/2022

A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange

We propose design methodologies for building a compact, unified and prog...
research
08/18/2014

Offline Signature-Based Fuzzy Vault (OSFV: Review and New Results

An offline signature-based fuzzy vault (OSFV) is a bio-cryptographic imp...
research
08/17/2020

Certificate and Signature Free Anonymity for V2V Communications

Anonymity is a desirable feature for vehicle-to-vehicle (V2V) communicat...

Please sign up or login with your details

Forgot password? Click here to reset