Key Agreement and Authentication Schemes Using Non-Commutative Semigroups
نویسنده
چکیده
We give a new two-pass authentication scheme, which is a generalisation of an authentication scheme of Sibert-Dehornoy-Girault based on the Diffie-Hellman conjugacy problem. Compared to the above scheme, for some parameters it is more efficient with respect to multiplications. We sketch a proof that our authentication scheme is secure.
منابع مشابه
ar X iv : 0 70 8 . 23 95 v 1 [ cs . C R ] 1 7 A ug 2 00 7 Key Agreement and Authentication Schemes Using Non - Commutative Semigroups
We give a new two-pass authentication scheme, which is a generalisation of an authentication scheme of Sibert-Dehornoy-Girault based on the Diffie-Hellman conjugacy problem. Compared to the above scheme, for some parameters it is more efficient with respect to multiplications. We sketch a proof that our authentication scheme is secure.
متن کاملZero-Knowledge Authentication Schemes Using Quasi-Polynomials over Non-Commutative Groups
A zero-knowledge authentication scheme is a type of authentication scheme, which gives no knowledge beyond the authenticity identifying an entity and is probabilistic than deterministic authentication scheme. This paper proposes Diffie-Hellman and Fiat-Shamir like zero-knowledge authentication schemes on general non-commutative groups. The key idea of our proposal is that for a given non-commut...
متن کاملAuthentication Schemes Using Polynomials Over Non-Commutative Rings
Authentication is a process by which an entity, which could be a person or intended computer, establishes its identity to another entity. In private and public computer networks including the Internet, authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Internet business and many other transactions req...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملIdentity Authentication and Key Agreement Schemes for Ad Hoc Networks
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/0708.2395 شماره
صفحات -
تاریخ انتشار 2007