Group Theory in Lattice-Based Cryptography
2023, International Journal of Mathematics And its Applications
Abstract
Group theory plays a fundamental role in lattice-based cryptography, providing a rich mathematical framework for the design and analysis of cryptographic protocols. This paper explores the application of group theory concepts within lattice-based cryptographic systems, focusing on the algebraic structures formed by lattices and their subgroups. The utilization of group theory in lattice-based cryptography enhances the security and efficiency of key exchange, encryption, and digital signatures. Through a mathematical lens, we investigate the foundational principles, theorems, and cryptographic constructions that leverage group theory, shedding light on the symbiotic relationship between group theory and lattice-based cryptography. The paper also proposes cryptographic scheme based on group theory in lattice-based.
References (22)
- I. Anshel, M. Anshel and D. Goldfeld, An algebraic method for public-key cryptography, Math. Res. Let., 6(1999), 287-291.
- I. Anshel, D. Atkins, D. Goldfeld and P. E. Gunnells, WalnutDSA: a group theoretic digital signature algorithm, International Journal of Computer Mathematics: Computer Systems Theory, 6(4)(2021), 260-284.
- C. Battarbee, D. Kahrobaei and S. F. Shahandashti, Cryptanalysis of semidirect product key exchange using matrices over non-commutative rings, in MathCrypt 2021, Journal of Mathematical Cryptology, 1(2)(2021), 2-9.
- R. Flores, D. Kahrobaei and T. Koberda, Algorithmic problems in right-angled artin groups: complexity and applications, J. Algebra, 519(2019), 111-129.
- J. Gryak and D. Kahrobaei, The status of polycyclic group-based cryptography: A survey and open problems, Groups Complexity Cryptology, 8(2016), 171-186.
- J. Gryak, D. Kahrobaei and C. Martinez-Perez, On the conjugacy problem in certain metabelian groups, Glasgow Mathematical Journal, 61(2)(2019), 251-269.
- K. Horan and D. Kahrobaei, Hidden Subgroup Problem and Post-quantum Group-based Cryptography, International Congress on Mathematical Software -ICMS 2018, LNCS, (2018), 218-226.
- M. Habeeb, D. Kahrobaei, C. Koupparis and V. Shpilrain, Public key exchange using semidirect product of (semi) groups, Applied Cryptography and Network Security, 2013(2013), 475-486.
- D. Kahrobaei and C. Koupparis, Noncommutative digital signatures using noncommutative groups, Groups, Complexity, Cryptology, De Gruyter, (2012), 377-384.
- K. H. Ko, S. J. Lee, J. H. Cheon, J. W. Han, J. Kang and C. Park, New public-key cryptosystem using braid groups, Advances in Cryptology, 1880(2000), 166-183.
- D. Kahrobaei, H. Lam and V. Shpilrain, System and method for private-key fully homomorphic encryption and private search between rings, US Patent 10, 396, 976(2019).
- D. Kahrobaei and V. Shpilrain, Using semidirect product of (semi) groups in public key cryptography, Computability in Europe, LNCS, (2016), 132-141.
- D. Kahrobaei and M. Stanojkovski, Cryptographic multilinear maps using pro-p groups, Advances in Mathematics of Communications, (2021), 1-14.
- NIST, Post-Quantum Cryptography PQC, (2022), https://csrc.nist.gov/News/2022/ pqc- candidates-to-be-standardized-and-round-4.
- A. Sutherland, Structure computation and discrete logarithms in finite abelian p-groups, Mathematics of Computation, 80(2011), 477-500.
- A. Wood, K. Najarian and D. Kahrobaei, Homomorphic encryption for machine learning in medicine and bioinformatics, ACM Comput. Surv., 53(4)(2020), 1-35.
- O. G. Udoaka and E. A. Frank, Finite Semi-group Modulo and Its Application to Symmetric Cryptography, International Journal of Pure Mathematics, (2022).
- Joan S. Birman, Volker Gebhardt and Juan Gonzalez-Meneses, Conjugacy in Garside groups I: cycling, powers and rigidity, Groups Geom, Dynamics, 1(2007), 221-279.
- Oded Goldreich, Shafi Goldwasser and Shai Halevi, Public-key cryptosystems from lattice reduction problems, in Advances in Cryptology -CRYPTO 97 (B.S. Kaliski Jr, ed.), Lecture Notes in Computer Science 1294 (Springer, Berlin, 1997), 112-131.
- Michael N. John and O. G. Udoaka, Algorithm and Cube-Lattice-Based Cryptography, International journal of Research Publication and Reviews, 4(10)(2023), 3312-3315.
- Michael N. John, and O. G. Udoaka, Computational GroupTheory and Quantum-Era Cryptography, International Journal of Scientific Research in Science, Engineering and Technology, 10(6)(2023), 1-10.
- Iris Anshel, Michael Anshel and Dorian Goldfeld, An algebraic method for public-key cryptography, Math. Res. Lett., 6(1999), 287-291.