An authentication scheme based on the twisted conjugacy problem

Vladimir Shpilrain, Alexander Ushakov

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

18 Scopus citations

Abstract

The conjugacy search problem in a group G is the problem of recovering an x∈ ∈G from given g∈ ∈G and h∈=∈x -∈1 gx. The alleged computational hardness of this problem in some groups was used in several recently suggested public key exchange protocols, including the one due to Anshel, Anshel, and Goldfeld, and the one due to Ko, Lee et al. Sibert, Dehornoy, and Girault used this problem in their authentication scheme, which was inspired by the Fiat-Shamir scheme involving repeating several times a three-pass challenge-response step. In this paper, we offer an authentication scheme whose security is based on the apparent hardness of the twisted conjugacy search problem which is: given a pair of endomorphisms (i.e., homomorphisms into itself) φ,ψ of a group G and a pair of elements w, t ∈ G, find an element s ∈ G such that t = ψ(s -1wφ(s) provided at least one such s exists. This problem appears to be very non-trivial even for free groups. We offer here another platform, namely, the semigroup of all 2 ×2 matrices over truncated one-variable polynomials over F2, the field of two elements, with transposition used instead of inversion in the equality above.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings
Pages366-372
Number of pages7
DOIs
StatePublished - 2008
Event6th International Conference on Applied Cryptography and Network Security, ACNS 2008 - New York, NY, United States
Duration: 3 Jun 20086 Jun 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5037 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Applied Cryptography and Network Security, ACNS 2008
Country/TerritoryUnited States
CityNew York, NY
Period3/06/086/06/08

Fingerprint

Dive into the research topics of 'An authentication scheme based on the twisted conjugacy problem'. Together they form a unique fingerprint.

Cite this