Survey of braid-based cryptography

The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. The attacks against these schemes were reviewed, such as solutions to conjugacy problems, le...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHU Ping1, WEN Qiao-yan2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74652567/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537641915351040
author ZHU Ping1
WEN Qiao-yan2
author_facet ZHU Ping1
WEN Qiao-yan2
author_sort ZHU Ping1
collection DOAJ
description The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. The attacks against these schemes were reviewed, such as solutions to conjugacy problems, length-based attacks, and linear representation-based attacks. Some problems in the study of this field were discussed, and several hints for future work were pointed out as well.
format Article
id doaj-art-b1d373ebe38f4721bca4c1c3f6c20aa8
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-b1d373ebe38f4721bca4c1c3f6c20aa82025-01-14T08:29:28ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013010511374652567Survey of braid-based cryptographyZHU Ping1WEN Qiao-yan2The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. The attacks against these schemes were reviewed, such as solutions to conjugacy problems, length-based attacks, and linear representation-based attacks. Some problems in the study of this field were discussed, and several hints for future work were pointed out as well.http://www.joconline.com.cn/zh/article/74652567/cryptographic schemebraid groupconjugacy search problemkey exchange
spellingShingle ZHU Ping1
WEN Qiao-yan2
Survey of braid-based cryptography
Tongxin xuebao
cryptographic scheme
braid group
conjugacy search problem
key exchange
title Survey of braid-based cryptography
title_full Survey of braid-based cryptography
title_fullStr Survey of braid-based cryptography
title_full_unstemmed Survey of braid-based cryptography
title_short Survey of braid-based cryptography
title_sort survey of braid based cryptography
topic cryptographic scheme
braid group
conjugacy search problem
key exchange
url http://www.joconline.com.cn/zh/article/74652567/
work_keys_str_mv AT zhuping1 surveyofbraidbasedcryptography
AT wenqiaoyan2 surveyofbraidbasedcryptography