Authentication schemes from actions on graphs, groups, or rings

Annals of Pure and Applied Logic 162 (3):194-200 (2010)
  Copy   BIBTEX

Abstract

We propose a couple of general ways of constructing authentication schemes from actions of a semigroup on a set, without exploiting any specific algebraic properties of the set acted upon. Then we give several concrete realizations of this general idea, and in particular, we describe several authentication schemes with long-term private keys where forgery is NP-hard. Computationally hard problems that can be employed in these realizations include the Graph Colorability problem, the Diophantine problem, and many others

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 93,590

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Context-sensitive transitive closure operators.Iain A. Stewart - 1994 - Annals of Pure and Applied Logic 66 (3):277-301.
Safe beliefs for propositional theories.Mauricio Osorio, Juan Pérez & José Arrazola - 2005 - Annals of Pure and Applied Logic 134 (1):63-82.
Extended use of IST.I. P. Van den Berg - 1992 - Annals of Pure and Applied Logic 58 (1):73-92.
Topics in invariant descriptive set theory.Howard Becker - 2001 - Annals of Pure and Applied Logic 111 (3):145-184.

Analytics

Added to PP
2013-12-18

Downloads
42 (#111,429)

6 months
13 (#1,035,185)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references