Academia.eduAcademia.edu

Outline

Group Theory in Lattice-Based Cryptography

2023, International Journal of Mathematics And its Applications

Abstract

Group theory plays a fundamental role in lattice-based cryptography, providing a rich mathematical framework for the design and analysis of cryptographic protocols. This paper explores the application of group theory concepts within lattice-based cryptographic systems, focusing on the algebraic structures formed by lattices and their subgroups. The utilization of group theory in lattice-based cryptography enhances the security and efficiency of key exchange, encryption, and digital signatures. Through a mathematical lens, we investigate the foundational principles, theorems, and cryptographic constructions that leverage group theory, shedding light on the symbiotic relationship between group theory and lattice-based cryptography. The paper also proposes cryptographic scheme based on group theory in lattice-based.

References (22)

  1. I. Anshel, M. Anshel and D. Goldfeld, An algebraic method for public-key cryptography, Math. Res. Let., 6(1999), 287-291.
  2. I. Anshel, D. Atkins, D. Goldfeld and P. E. Gunnells, WalnutDSA: a group theoretic digital signature algorithm, International Journal of Computer Mathematics: Computer Systems Theory, 6(4)(2021), 260-284.
  3. C. Battarbee, D. Kahrobaei and S. F. Shahandashti, Cryptanalysis of semidirect product key exchange using matrices over non-commutative rings, in MathCrypt 2021, Journal of Mathematical Cryptology, 1(2)(2021), 2-9.
  4. R. Flores, D. Kahrobaei and T. Koberda, Algorithmic problems in right-angled artin groups: complexity and applications, J. Algebra, 519(2019), 111-129.
  5. J. Gryak and D. Kahrobaei, The status of polycyclic group-based cryptography: A survey and open problems, Groups Complexity Cryptology, 8(2016), 171-186.
  6. J. Gryak, D. Kahrobaei and C. Martinez-Perez, On the conjugacy problem in certain metabelian groups, Glasgow Mathematical Journal, 61(2)(2019), 251-269.
  7. K. Horan and D. Kahrobaei, Hidden Subgroup Problem and Post-quantum Group-based Cryptography, International Congress on Mathematical Software -ICMS 2018, LNCS, (2018), 218-226.
  8. M. Habeeb, D. Kahrobaei, C. Koupparis and V. Shpilrain, Public key exchange using semidirect product of (semi) groups, Applied Cryptography and Network Security, 2013(2013), 475-486.
  9. D. Kahrobaei and C. Koupparis, Noncommutative digital signatures using noncommutative groups, Groups, Complexity, Cryptology, De Gruyter, (2012), 377-384.
  10. K. H. Ko, S. J. Lee, J. H. Cheon, J. W. Han, J. Kang and C. Park, New public-key cryptosystem using braid groups, Advances in Cryptology, 1880(2000), 166-183.
  11. D. Kahrobaei, H. Lam and V. Shpilrain, System and method for private-key fully homomorphic encryption and private search between rings, US Patent 10, 396, 976(2019).
  12. D. Kahrobaei and V. Shpilrain, Using semidirect product of (semi) groups in public key cryptography, Computability in Europe, LNCS, (2016), 132-141.
  13. D. Kahrobaei and M. Stanojkovski, Cryptographic multilinear maps using pro-p groups, Advances in Mathematics of Communications, (2021), 1-14.
  14. NIST, Post-Quantum Cryptography PQC, (2022), https://csrc.nist.gov/News/2022/ pqc- candidates-to-be-standardized-and-round-4.
  15. A. Sutherland, Structure computation and discrete logarithms in finite abelian p-groups, Mathematics of Computation, 80(2011), 477-500.
  16. A. Wood, K. Najarian and D. Kahrobaei, Homomorphic encryption for machine learning in medicine and bioinformatics, ACM Comput. Surv., 53(4)(2020), 1-35.
  17. O. G. Udoaka and E. A. Frank, Finite Semi-group Modulo and Its Application to Symmetric Cryptography, International Journal of Pure Mathematics, (2022).
  18. Joan S. Birman, Volker Gebhardt and Juan Gonzalez-Meneses, Conjugacy in Garside groups I: cycling, powers and rigidity, Groups Geom, Dynamics, 1(2007), 221-279.
  19. Oded Goldreich, Shafi Goldwasser and Shai Halevi, Public-key cryptosystems from lattice reduction problems, in Advances in Cryptology -CRYPTO 97 (B.S. Kaliski Jr, ed.), Lecture Notes in Computer Science 1294 (Springer, Berlin, 1997), 112-131.
  20. Michael N. John and O. G. Udoaka, Algorithm and Cube-Lattice-Based Cryptography, International journal of Research Publication and Reviews, 4(10)(2023), 3312-3315.
  21. Michael N. John, and O. G. Udoaka, Computational GroupTheory and Quantum-Era Cryptography, International Journal of Scientific Research in Science, Engineering and Technology, 10(6)(2023), 1-10.
  22. Iris Anshel, Michael Anshel and Dorian Goldfeld, An algebraic method for public-key cryptography, Math. Res. Lett., 6(1999), 287-291.