DocumentCode :
3755422
Title :
An identification protocol based on the twisted ring-root extraction problem
Author :
Maheswara Rao Valluri
Author_Institution :
School of Mathematical and Computing Sciences, College of Engineering, Science and Technology, Fiji National University, P.O. Box No: 7222, Derrick Campus, Suva, Fiji Island
fYear :
2015
Firstpage :
95
Lastpage :
97
Abstract :
This paper introduces the twisted ring-root extraction problem, and proposes an identification protocol whose security is tied to the twisted ring-root extraction problem: given an endomorphism ψ of a ring R of N-truncated single-variable polynomials over a finite field of prime order, and given an integer e ≥ 2, and a polynomial y ∈ R; find a polynomial s ∈ R such that y = ψ(se) (assuming at least one such s exists). We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform ring R. The performance, key space, and other security issues are also discussed.
Keywords :
"Protocols","Public key","Authentication","Probabilistic logic","Industrial control"
Publisher :
ieee
Conference_Titel :
Industrial Control Systems Security (WCICSS), 2015 World Congress on
Type :
conf
DOI :
10.1109/WCICSS.2015.7420333
Filename :
7420333
Link To Document :
بازگشت