DocumentCode
3755422
Title
An identification protocol based on the twisted ring-root extraction problem
Author
Maheswara Rao Valluri
Author_Institution
School of Mathematical and Computing Sciences, College of Engineering, Science and Technology, Fiji National University, P.O. Box No: 7222, Derrick Campus, Suva, Fiji Island
fYear
2015
Firstpage
95
Lastpage
97
Abstract
This paper introduces the twisted ring-root extraction problem, and proposes an identification protocol whose security is tied to the twisted ring-root extraction problem: given an endomorphism ψ of a ring R of N-truncated single-variable polynomials over a finite field of prime order, and given an integer e ≥ 2, and a polynomial y ∈ R; find a polynomial s ∈ R such that y = ψ(se) (assuming at least one such s exists). We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform ring R. The performance, key space, and other security issues are also discussed.
Keywords
"Protocols","Public key","Authentication","Probabilistic logic","Industrial control"
Publisher
ieee
Conference_Titel
Industrial Control Systems Security (WCICSS), 2015 World Congress on
Type
conf
DOI
10.1109/WCICSS.2015.7420333
Filename
7420333
Link To Document