The Diffie–Hellman Problem in Lie Algebras

  • Beata Rafalska
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4585)

Abstract

Cryptography in its present state relies increasingly on complex mathematical theories, e.g., elliptic curves, group theory, etc. We address in this article the problem of proxy signatures and we set this problem in the framework of Lie algebras. We show how to use a chosen maximal set of differentiable automorphisms in order to carry out the task of proxy signing. We also show possible attacks and the way to protect against them.

Keywords

cryptography proxy signatures attacks Lie algebras differentiable maps 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mahalanobis, A.: Diffie-Hellman key exchange protocol and non-abelian nilpotent groups (2005), http://eprint.iacr.org/2005/110.ps
  2. 2.
    Koblitz, N.: Algebraiczne aspekty kryptografii, WNT, Warszawa (2000)Google Scholar
  3. 3.
    Wojtyñski, W.: Grupy i algebry Liego. PWN, Warszawa (1986)Google Scholar
  4. 4.
    Pomykaa, J., Barabasz, S.: Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers. Fundamenta Informaticae 69(4), 411–425 (2006)MathSciNetGoogle Scholar
  5. 5.
    Goldwasser, S., Bellare, M.: Lecture Notes on Cryptography (1996) http://www-cse.ucsd.edu/~mihir/papers/gb.html
  6. 6.
    Desmedt, I.: Some Recent Research Aspect of Threshold Cryptography, Departament of Mathematics Royal Holloway University of London (1997) http://citeseer.ist.psu.edu/desmedt97some.html
  7. 7.
    Zhang, K.: Threshold Proxy Signature Schemes, Cambridge University Computer Laboratory (1997) http://citeseer.ist.psu.edu/zhang97threshold.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Beata Rafalska
    • 1
  1. 1.University of Warmia and Mazury, OlsztynPoland

Personalised recommendations