Post-Quantum Cryptography: Riemann Primitives and Chrysalis

01/23/2018
by   Ian Malloy, et al.
0

The Chrysalis project is a proposed method for post-quantum cryptography using the Riemann sphere. To this end, Riemann primitives are introduced in addition to a novel implementation of this new method. Chrysalis itself is the first cryptographic scheme to rely on Holomorphic Learning with Errors, which is a complex form of Learning with Errors relying on the Gauss Circle Problem within the Riemann sphere. The principle security reduction proposed by this novel cryptographic scheme applies complex analysis of a Riemannian manifold along with tangent bundles relative to a disjoint union of subsets based upon a maximal element. A surjective function allows the mapping of multivariate integrals onto subspaces. The proposed NP-Hard problem for security reduction is the non-commutative Grothendieck problem. The reduction of this problem is achieved by applying bilinear matrices in terms of the holomorphic vector bundle such that coordinate systems are intersected via surjective functions between each holomorphic expression. The result is an arbitrarily selected set of points within constraints of bilinear matrix inequalities approximate to the non-commutative problem. This is achieved by applying the quadratic form of bilinear matrices to a linear matrix inequality.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/21/2022

Securing the Future Internet of Things with Post-Quantum Cryptography

Traditional and lightweight cryptography primitives and protocols are in...
research
02/28/2023

Revocable Cryptography from Learning with Errors

Quantum cryptography leverages many unique features of quantum informati...
research
11/21/2017

Bilinear cryptography using finite p-groups of nilpotency class 2

In this short note, we develop a novel idea of a bilinear cryptosystem u...
research
10/07/2022

One-Wayness in Quantum Cryptography

The existence of one-way functions is one of the most fundamental assump...
research
06/14/2018

Ramanujan graphs in cryptography

In this paper we study the security of a proposal for Post-Quantum Crypt...
research
03/15/2023

Cryptographic Primitives based on Compact Knapsack Problem

In the present paper, we extend previous results of an id scheme based o...
research
07/13/2023

Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis

Quantum computing is emerging as an unprecedented threat to the current ...

Please sign up or login with your details

Forgot password? Click here to reset