Public key cryptography based on skew dihedral group rings

05/06/2022
by   Javier de la Cruz, et al.
0

In this paper, we propose to use a skew dihedral group ring given by the group D_2n and the finite field 𝔽_q^2 for public-key cryptography. Using the ambient space 𝔽_q^2^θ D_2n and a group homomorphism θ: D_2n→Aut(𝔽_q^2), we introduce a key exchange protocol and present an analysis of its security. Moreover, we explore the properties of the resulting skew group ring 𝔽_q^2^θ D_2n, exploiting them to enhance our key exchange protocol. We also introduce a probabilistic public-key scheme derived from our key exchange protocol and obtain a key encapsulation mechanism (KEM) by applying a well-known generic transformation to our public-key scheme. Finally, we present a proof-of-concept implementation of our cryptographic constructions. To the best of our knowledge, this is the first paper that proposes a skew dihedral group ring for public-key cryptography.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/14/2021

Public key cryptography based on twisted dihedral group algebras

In this paper, we propose to use a twisted dihedral group algebra for pu...
research
12/25/2017

A Provably Secure Ring Signature Scheme in Certificateless Cryptography

Ring signature is a kind of group-oriented signature. It allows a member...
research
05/19/2020

Cryptanalysis of ITRU

ITRU cryptosystem is a public key cryptosystem and one of the known vari...
research
04/12/2021

Entropoid Based Cryptography

By analogy with the developed cryptographic theory of discrete logarithm...
research
05/31/2023

Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH

The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the end...
research
01/13/2020

Wyner-Ziv reconciliation for key exchange based on Ring-LWE

We consider a key encapsulation mechanism (KEM) based on ring-LWE where ...
research
11/21/2022

Koopman interpretation and analysis of a public-key cryptosystem: Diffie-Hellman key exchange

The security of public-key cryptosystems relies on computationally hard ...

Please sign up or login with your details

Forgot password? Click here to reset