Sciweavers

ACNS
2005
Springer

Thompson's Group and Public Key Cryptography

14 years 5 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established protocols based on numeric computation. Notably, the protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al. exploited the conjugacy search problem in groups, which is a ramification of the discrete logarithm problem. However, it is a prevalent opinion now that the conjugacy search problem alone is unlikely to provide sufficient level of security no matter what particular group is chosen as a platform. In this paper we employ another problem (we call it the decomposition problem), which is more general than the conjugacy search problem, and we suggest to use R. Thompson’s group as a platform. This group is well known in many areas of mathematics, including algebra, geometry, and analysis. It also has several properties that make it fit for cryptographic purposes. In particular, we show here that the word pr...
Vladimir Shpilrain, Alexander Ushakov
Added 26 Jun 2010
Updated 26 Jun 2010
Type Conference
Year 2005
Where ACNS
Authors Vladimir Shpilrain, Alexander Ushakov
Comments (0)