2005-12
AUTHORSJens-Matthias Bohli, Rainer Steinwandt, María Isabel González Vasco, Consuelo Martínez
ABSTRACTThe public key cryptosystem MST1 has been introduced by Magliveras et al. [12] (Public Key Cryptosystems from Group Factorizations. Jatra Mountain Mathematical Publications). Its security relies on the hardness of factoring with respect to wild logarithmic signatures. To identify ‘wild-like’ logarithmic signatures, the criterion of being totally-non-transversal has been proposed. We present tame totally-non-transversal logarithmic signatures for the alternating and symmetric groups of degree ≥ 5. Hence, basing a key generation procedure on the assumption that totally-non-transversal logarithmic signatures are ‘wild like’ seems critical. We also discuss the problem of recognizing ‘weak’ totally-non-transversal logarithmic signatures, and demonstrate that another proposed key generation procedure based on permutably transversal logarithmic signatures may produce weak keys. More... »
PAGES509-524
http://scigraph.springernature.com/pub.10.1007/s10623-004-4040-y
DOIhttp://dx.doi.org/10.1007/s10623-004-4040-y
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1008129654
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0101",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Pure Mathematics",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/01",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Mathematical Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Karlsruhe Institute of Technology",
"id": "https://www.grid.ac/institutes/grid.7892.4",
"name": [
"Institut f\u00fcr Algorithmen und Kognitive Systeme, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Universit\u00e4t Karlsruhe, 76128, Karlsruhe, Germany"
],
"type": "Organization"
},
"familyName": "Bohli",
"givenName": "Jens-Matthias",
"id": "sg:person.07712776111.59",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07712776111.59"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Karlsruhe Institute of Technology",
"id": "https://www.grid.ac/institutes/grid.7892.4",
"name": [
"Institut f\u00fcr Algorithmen und Kognitive Systeme, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Universit\u00e4t Karlsruhe, 76128, Karlsruhe, Germany"
],
"type": "Organization"
},
"familyName": "Steinwandt",
"givenName": "Rainer",
"id": "sg:person.014214774201.74",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014214774201.74"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "King Juan Carlos University",
"id": "https://www.grid.ac/institutes/grid.28479.30",
"name": [
"A\u00b4rea de Matem\u00e1tica Aplicada, Universidad Rey Juan Carlos, c/Tulip\u00e1n, s/n, 28933, Madrid, M\u00f3stoles, Spain"
],
"type": "Organization"
},
"familyName": "Vasco",
"givenName": "Mar\u00eda Isabel Gonz\u00e1lez",
"id": "sg:person.011645563732.16",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011645563732.16"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of Oviedo",
"id": "https://www.grid.ac/institutes/grid.10863.3c",
"name": [
"Departamento de Matem\u00e1ticas, Universidad de Oviedo, c/Calvo Sotelo, s/n, 33007, Oviedo, Spain"
],
"type": "Organization"
},
"familyName": "Mart\u00ednez",
"givenName": "Consuelo",
"id": "sg:person.015261576461.61",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015261576461.61"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/3-540-44598-6_10",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1001259283",
"https://doi.org/10.1007/3-540-44598-6_10"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-44647-8_28",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1009717904",
"https://doi.org/10.1007/3-540-44647-8_28"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-44647-8_28",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1009717904",
"https://doi.org/10.1007/3-540-44647-8_28"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1023/b:desi.0000036247.38461.c9",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017403519",
"https://doi.org/10.1023/b:desi.0000036247.38461.c9"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1080/10586458.2004.10504552",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1019813214"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s00145-001-0018-3",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1034803657",
"https://doi.org/10.1007/s00145-001-0018-3"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1006/jsco.1996.0125",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1036727338"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1080/10586458.2003.10504708",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1042004066"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bf02451113",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1053438151",
"https://doi.org/10.1007/bf02451113"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bf02451113",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1053438151",
"https://doi.org/10.1007/bf02451113"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1137/s0097539795293172",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1062880065"
],
"type": "CreativeWork"
}
],
"datePublished": "2005-12",
"datePublishedReg": "2005-12-01",
"description": "The public key cryptosystem MST1 has been introduced by Magliveras et al. [12] (Public Key Cryptosystems from Group Factorizations. Jatra Mountain Mathematical Publications). Its security relies on the hardness of factoring with respect to wild logarithmic signatures. To identify \u2018wild-like\u2019 logarithmic signatures, the criterion of being totally-non-transversal has been proposed. We present tame totally-non-transversal logarithmic signatures for the alternating and symmetric groups of degree \u2265 5. Hence, basing a key generation procedure on the assumption that totally-non-transversal logarithmic signatures are \u2018wild like\u2019 seems critical. We also discuss the problem of recognizing \u2018weak\u2019 totally-non-transversal logarithmic signatures, and demonstrate that another proposed key generation procedure based on permutably transversal logarithmic signatures may produce weak keys.",
"genre": "research_article",
"id": "sg:pub.10.1007/s10623-004-4040-y",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1136552",
"issn": [
"0925-1022",
"1573-7586"
],
"name": "Designs, Codes and Cryptography",
"type": "Periodical"
},
{
"issueNumber": "3",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "37"
}
],
"name": "Weak Keys in MST1",
"pagination": "509-524",
"productId": [
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"26bb024812dba94b23b076ff9aa0f05fc94f8f8be5bf0a147523fb3a81dd89b1"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s10623-004-4040-y"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1008129654"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s10623-004-4040-y",
"https://app.dimensions.ai/details/publication/pub.1008129654"
],
"sdDataset": "articles",
"sdDatePublished": "2019-04-11T13:56",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000371_0000000371/records_130817_00000000.jsonl",
"type": "ScholarlyArticle",
"url": "http://link.springer.com/10.1007%2Fs10623-004-4040-y"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10623-004-4040-y'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10623-004-4040-y'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10623-004-4040-y'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10623-004-4040-y'
This table displays all metadata directly associated to this object as RDF triples.
120 TRIPLES
21 PREDICATES
36 URIs
19 LITERALS
7 BLANK NODES