-
Multi-recipient and threshold encryption based on hidden multipliers
Abstract: Let $S$ be a pool of $s$ parties and Alice be the dealer. In this paper, we propose a scheme that allows the dealer to encrypt messages in such a way that only one authorized coalition of parties (which the dealer chooses depending on the message) can decrypt. At the setup stage, each of the parties involved in the process receives an individual key from the dealer. To decrypt information, an auth… ▽ More
Submitted 18 February, 2023; v1 submitted 13 October, 2022; originally announced October 2022.
Comments: 12 pages. Published in journal of Groups, Complexity, Cryptology. arXiv admin note: substantial text overlap with arXiv:2108.06967
MSC Class: 94A60
Journal ref: journal of Groups, complexity, cryptology, Volume 14, Issue 2 (March 21, 2023) gcc:10150
-
arXiv:2108.06967 [pdf, ps, other]
Multiparty secret sharing based on hidden multipliers
Abstract: Secret sharing schemes based on the idea of hidden multipliers in encryption are proposed. As a platform, one can use both multiplicative groups of finite fields and groups of invertible elements of commutative rings, in particular, multiplicative groups of residue rings. We propose two versions of the secret sharing scheme and a version of ($k,n$)-thrested scheme. For a given $n$, the dealer can… ▽ More
Submitted 16 August, 2021; originally announced August 2021.
Comments: 9 pages
MSC Class: 94A62 94A60 11T71 12E20 68P25
-
arXiv:1911.00895 [pdf, ps, other]
Cryptanalysis of a new version of the MOR scheme
Abstract: We show that an attack based on the linear decomposition method introduced by the author can be efficiently applied to the new version of the MOR scheme proposed in \cite{BMSS}. We draw attention to some inaccuracies in the description of this version. We show how the action of an exponent of a given automorphism (for example, the action of its inverse) can be calculated, and we also show how the… ▽ More
Submitted 3 November, 2019; originally announced November 2019.
Comments: 6 pages
MSC Class: 15A80 94A60
-
arXiv:1910.09480 [pdf, ps, other]
Cryptanalysis of two schemes of Baba et al. by linear algebra methods
Abstract: We show that the attacks based on the linear decomposition method introduced by the author and the span-method introduced by Tsaban allow one to find the transmitted message in the cryptosystem and the exchanged key in the protocol which are proposed by Baba et al.
Submitted 21 October, 2019; originally announced October 2019.
Comments: 5 pages
MSC Class: 94A60; 11T71
-
arXiv:1811.09876 [pdf, ps, other]
Cryptographic analysis of the Modified Matrix Modular Cryptosystem
Abstract: We show that the Modified Matrix Modular Cryptosystem proposed by S.K. Rososhek is not secure against the attack based on the linear decomposition method. The security of the encryption scheme in the Rososhek's system is based on the mix of the conjugacy search problem and random "salt". We do not solve the conjugacy search problem and we are not looking for the exact meaning of the "salt". The tr… ▽ More
Submitted 22 October, 2018; originally announced November 2018.
Comments: 9 pages
MSC Class: 94A60
-
arXiv:1603.02031 [pdf, ps, other]
How to make RSA and some other encryptions probabilistic
Abstract: A new scheme of probabilistic subgroup-related encryption is introduced. Some applications of this scheme based on the RSA, Diffie-Hellman and ElGamal encryption algorithms are described. Security assumptions and main advantages of this scheme are discussed. We outline that this scheme is potentially semantically secure under reasonable cryptographic assumptions.
Submitted 7 March, 2016; originally announced March 2016.
Comments: 7 pages
MSC Class: 20F10; 20D60; 12E20
-
arXiv:1501.01152 [pdf, ps, other]
Linear decomposition attack on public key exchange protocols using semidirect products of (semi)groups
Abstract: We show that a linear decomposition attack based on the decomposition method introduced by the author works by finding the exchanged secret keys in all main protocols using semidirect products of (semi)grops proposed by Kahrobaei, Shpilrain, Habeeb, Koupparis and Lam.
Submitted 6 January, 2015; originally announced January 2015.
MSC Class: 20F10