Skip to main content

Showing 1–7 of 7 results for author: Roman'kov, V

Searching in archive cs. Search in all archives.
.
  1. Multi-recipient and threshold encryption based on hidden multipliers

    Authors: Vitaly Roman'kov

    Abstract: Let $S$ be a pool of $s$ parties and Alice be the dealer. In this paper, we propose a scheme that allows the dealer to encrypt messages in such a way that only one authorized coalition of parties (which the dealer chooses depending on the message) can decrypt. At the setup stage, each of the parties involved in the process receives an individual key from the dealer. To decrypt information, an auth… ▽ More

    Submitted 18 February, 2023; v1 submitted 13 October, 2022; originally announced October 2022.

    Comments: 12 pages. Published in journal of Groups, Complexity, Cryptology. arXiv admin note: substantial text overlap with arXiv:2108.06967

    MSC Class: 94A60

    Journal ref: journal of Groups, complexity, cryptology, Volume 14, Issue 2 (March 21, 2023) gcc:10150

  2. arXiv:2108.06967  [pdf, ps, other

    cs.CR

    Multiparty secret sharing based on hidden multipliers

    Authors: Vitaly Roman'kov

    Abstract: Secret sharing schemes based on the idea of hidden multipliers in encryption are proposed. As a platform, one can use both multiplicative groups of finite fields and groups of invertible elements of commutative rings, in particular, multiplicative groups of residue rings. We propose two versions of the secret sharing scheme and a version of ($k,n$)-thrested scheme. For a given $n$, the dealer can… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

    Comments: 9 pages

    MSC Class: 94A62 94A60 11T71 12E20 68P25

  3. arXiv:1911.00895  [pdf, ps, other

    cs.CR math.GR

    Cryptanalysis of a new version of the MOR scheme

    Authors: Vitaly Roman'kov

    Abstract: We show that an attack based on the linear decomposition method introduced by the author can be efficiently applied to the new version of the MOR scheme proposed in \cite{BMSS}. We draw attention to some inaccuracies in the description of this version. We show how the action of an exponent of a given automorphism (for example, the action of its inverse) can be calculated, and we also show how the… ▽ More

    Submitted 3 November, 2019; originally announced November 2019.

    Comments: 6 pages

    MSC Class: 15A80 94A60

  4. arXiv:1910.09480  [pdf, ps, other

    cs.CR math.GR

    Cryptanalysis of two schemes of Baba et al. by linear algebra methods

    Authors: V. Roman'kov

    Abstract: We show that the attacks based on the linear decomposition method introduced by the author and the span-method introduced by Tsaban allow one to find the transmitted message in the cryptosystem and the exchanged key in the protocol which are proposed by Baba et al.

    Submitted 21 October, 2019; originally announced October 2019.

    Comments: 5 pages

    MSC Class: 94A60; 11T71

  5. arXiv:1811.09876  [pdf, ps, other

    cs.CR

    Cryptographic analysis of the Modified Matrix Modular Cryptosystem

    Authors: Vitaliĭ Roman'kov

    Abstract: We show that the Modified Matrix Modular Cryptosystem proposed by S.K. Rososhek is not secure against the attack based on the linear decomposition method. The security of the encryption scheme in the Rososhek's system is based on the mix of the conjugacy search problem and random "salt". We do not solve the conjugacy search problem and we are not looking for the exact meaning of the "salt". The tr… ▽ More

    Submitted 22 October, 2018; originally announced November 2018.

    Comments: 9 pages

    MSC Class: 94A60

  6. arXiv:1603.02031  [pdf, ps, other

    cs.CR math.GR

    How to make RSA and some other encryptions probabilistic

    Authors: Vitalii Roman'kov

    Abstract: A new scheme of probabilistic subgroup-related encryption is introduced. Some applications of this scheme based on the RSA, Diffie-Hellman and ElGamal encryption algorithms are described. Security assumptions and main advantages of this scheme are discussed. We outline that this scheme is potentially semantically secure under reasonable cryptographic assumptions.

    Submitted 7 March, 2016; originally announced March 2016.

    Comments: 7 pages

    MSC Class: 20F10; 20D60; 12E20

  7. arXiv:1501.01152  [pdf, ps, other

    cs.CR math.GR

    Linear decomposition attack on public key exchange protocols using semidirect products of (semi)groups

    Authors: Vitaliĭ Roman'kov

    Abstract: We show that a linear decomposition attack based on the decomposition method introduced by the author works by finding the exchanged secret keys in all main protocols using semidirect products of (semi)grops proposed by Kahrobaei, Shpilrain, Habeeb, Koupparis and Lam.

    Submitted 6 January, 2015; originally announced January 2015.

    MSC Class: 20F10