Survey of braid-based cryptography
The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. The attacks against these schemes were reviewed, such as solutions to conjugacy problems, le...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74652567/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537641915351040 |
---|---|
author | ZHU Ping1 WEN Qiao-yan2 |
author_facet | ZHU Ping1 WEN Qiao-yan2 |
author_sort | ZHU Ping1 |
collection | DOAJ |
description | The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. The attacks against these schemes were reviewed, such as solutions to conjugacy problems, length-based attacks, and linear representation-based attacks. Some problems in the study of this field were discussed, and several hints for future work were pointed out as well. |
format | Article |
id | doaj-art-b1d373ebe38f4721bca4c1c3f6c20aa8 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-b1d373ebe38f4721bca4c1c3f6c20aa82025-01-14T08:29:28ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013010511374652567Survey of braid-based cryptographyZHU Ping1WEN Qiao-yan2The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. The attacks against these schemes were reviewed, such as solutions to conjugacy problems, length-based attacks, and linear representation-based attacks. Some problems in the study of this field were discussed, and several hints for future work were pointed out as well.http://www.joconline.com.cn/zh/article/74652567/cryptographic schemebraid groupconjugacy search problemkey exchange |
spellingShingle | ZHU Ping1 WEN Qiao-yan2 Survey of braid-based cryptography Tongxin xuebao cryptographic scheme braid group conjugacy search problem key exchange |
title | Survey of braid-based cryptography |
title_full | Survey of braid-based cryptography |
title_fullStr | Survey of braid-based cryptography |
title_full_unstemmed | Survey of braid-based cryptography |
title_short | Survey of braid-based cryptography |
title_sort | survey of braid based cryptography |
topic | cryptographic scheme braid group conjugacy search problem key exchange |
url | http://www.joconline.com.cn/zh/article/74652567/ |
work_keys_str_mv | AT zhuping1 surveyofbraidbasedcryptography AT wenqiaoyan2 surveyofbraidbasedcryptography |