Abstract
The paper cryptanalyses two public key cryptosystems based on \({\mbox{SL}_2 (\mathbb{Z})}\) that have been recently proposed by Yamamura.
Chapter PDF
References
Blackburn, S.R., Murphy, S., Stern, J.: Weaknesses of a public-key cryptosystem based on factorizations of finite groups. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 50–54. Springer, Heidelberg (1994)
Blackburn, S.R., Murphy, S., Stern, J.: The cryptanalysis of a public-key implementation of Finite Group Mappings. J. Cryptology 8, 157–166 (1995)
Charnes, C., Pieprzyk, J.: Attacking the SL2 hashing scheme. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 322–330. Springer, Heidelberg (1995)
Jones, G.A., Singerman, D.: Complex functions, Cambridge (1987)
Geiselmann, W.: A note on the hash function of Tillich and Zémor. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 257–263. Springer, Heidelberg (1995)
Magliveras, S.S., Memon, N.D.: Algebraic properties of cryptosystem PGM. J. Cryptology 5, 167–183 (1992)
Nguyen, P., Stern, J.: Merkle–Hellman revisited: A cryptanalysis of the Qu– Vanstone cryptosystem based on group factorizations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 198–212. Springer, Heidelberg (1997)
Press, W., Flannery, B., Teukolsky, S., Vetterling, W.: Numerical Recipes in C, 2nd edn. Cambridge University Press, Cambridge (1988)
Qu, M., Vanstone, S.A.: New public-key cryptosystems based on factorizations of finite groups. presented at AUSCRYPT (1992)
Qu, M., Vanstone, S.A.: The knapsack problem in cryptography. In: Finite fields: Theory, Applications, and Algorithms, Contemporary Mathematics. vol. 168, pp. 291–308. American Mathematical Society (1994)
Robinson, D.J.S.: A Course in the Theory of Groups. Springer, New York (1982)
Tillich, J.-P., Zémor, G.: Hashing with SL2. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 40–49. Springer, Heidelberg (1994)
Yamamura, A.: Public-key cryptosystems using the modular group. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 203–216. Springer, Heidelberg (1998)
Yamamura, A.: A functional cryptosystem using a group action. In: ACIPS (to appear)
Yamamura, A.: Personal communication (March 3, 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Blackburn, S.R., Galbraith, S. (1999). Cryptanalysis of Two Cryptosystems Based on Group Actions. In: Lam, KY., Okamoto, E., Xing, C. (eds) Advances in Cryptology - ASIACRYPT’99. ASIACRYPT 1999. Lecture Notes in Computer Science, vol 1716. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-48000-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-48000-6_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66666-0
Online ISBN: 978-3-540-48000-6
eBook Packages: Springer Book Archive