• DocumentCode
    3755422
  • Title

    An identification protocol based on the twisted ring-root extraction problem

  • Author

    Maheswara Rao Valluri

  • Author_Institution
    School of Mathematical and Computing Sciences, College of Engineering, Science and Technology, Fiji National University, P.O. Box No: 7222, Derrick Campus, Suva, Fiji Island
  • fYear
    2015
  • Firstpage
    95
  • Lastpage
    97
  • Abstract
    This paper introduces the twisted ring-root extraction problem, and proposes an identification protocol whose security is tied to the twisted ring-root extraction problem: given an endomorphism ψ of a ring R of N-truncated single-variable polynomials over a finite field of prime order, and given an integer e ≥ 2, and a polynomial y ∈ R; find a polynomial s ∈ R such that y = ψ(se) (assuming at least one such s exists). We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform ring R. The performance, key space, and other security issues are also discussed.
  • Keywords
    "Protocols","Public key","Authentication","Probabilistic logic","Industrial control"
  • Publisher
    ieee
  • Conference_Titel
    Industrial Control Systems Security (WCICSS), 2015 World Congress on
  • Type

    conf

  • DOI
    10.1109/WCICSS.2015.7420333
  • Filename
    7420333