Sciweavers

ACNS
2008
Springer

An Authentication Scheme Based on the Twisted Conjugacy Problem

14 years 2 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was used in several recently suggested public key exchange protocols, including the one due to Anshel, Anshel, and Goldfeld, and the one due to Ko, Lee et al. Sibert, Dehornoy, and Girault used this problem in their authentication scheme, which was inspired by the Fiat-Shamir scheme involving repeating several times a three-pass challenge-response step. In this paper, we offer an authentication scheme whose security is based on the apparent hardness of the twisted conjugacy search problem which is: given a pair of endomorphisms (i.e., homomorphisms into itself) , of a group G and a pair of elements w, t G, find an element s G such that t = (s-1 )w(s) provided at least one such s exists. This problem appears to be very non-trivial even for free groups. We offer here another platform, namely, the semigroup of a...
Vladimir Shpilrain, Alexander Ushakov
Added 12 Oct 2010
Updated 12 Oct 2010
Type Conference
Year 2008
Where ACNS
Authors Vladimir Shpilrain, Alexander Ushakov
Comments (0)