Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A verifiable secret shuffe of homomorphic encryptions
J Groth - International Workshop on Public Key Cryptography, 2002 - Springer
We show how to prove in honest verifier zero-knowledge the correctness of a shuffe of
homomorphic encryptions (or homomorphic commitments.) A shuffe consists in a …
homomorphic encryptions (or homomorphic commitments.) A shuffe consists in a …
Thompson's group and public key cryptography
Recently, several public key exchange protocols based on symbolic computation in non-
commutative (semi) groups were proposed as a more efficient alternative to well established …
commutative (semi) groups were proposed as a more efficient alternative to well established …
Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
B Tsaban - Journal of Cryptology, 2015 - Springer
We introduce the linear centralizer method, and use it to devise a provable polynomial-time
solution of the Commutator Key Exchange Problem, the computational problem on which, in …
solution of the Commutator Key Exchange Problem, the computational problem on which, in …
The conjugacy search problem in public key cryptography: unnecessary and insufficient
The conjugacy search problem in a group G is the problem of recovering an x ∈ G from
given g ∈ G and h= x− 1 gx. This problem is in the core of several recently suggested public …
given g ∈ G and h= x− 1 gx. This problem is in the core of several recently suggested public …
A practical attack on some braid group based cryptographic primitives
A simple heuristic approach to the conjugacy problem in braid groups is described. Although
it does not provide a general solution to the latter problem, it demonstrates that various …
it does not provide a general solution to the latter problem, it demonstrates that various …
A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem
JH Cheon, B Jun - Advances in Cryptology-CRYPTO 2003: 23rd Annual …, 2003 - Springer
We propose the first polynomial time algorithm for the braid Diffie-Hellman conjugacy
problem (DHCP) on which the braid key exchange scheme and the braid encryption scheme …
problem (DHCP) on which the braid key exchange scheme and the braid encryption scheme …
New signature scheme using conjugacy problem
We propose a new digital signature scheme based on a non-commutative group where the
conjugacy search problem is hard and the conjugacy decision problem is feasible. We …
conjugacy search problem is hard and the conjugacy decision problem is feasible. We …
Cryptanalysis via algebraic spans
A Ben-Zvi, A Kalka, B Tsaban - … in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
We introduce a method for obtaining provable polynomial time solutions of problems in
nonabelian algebraic cryptography. This method is widely applicable, easier to apply, and …
nonabelian algebraic cryptography. This method is widely applicable, easier to apply, and …
A new key exchange protocol based on the decomposition problem
In this paper we present a new key establishment protocol based on the decomposition
problem in non-commutative groups which is: given two elements $ w, w_1 $ of the platform …
problem in non-commutative groups which is: given two elements $ w, w_1 $ of the platform …
Potential weaknesses of the commutator key agreement protocol based on braid groups
SJ Lee, E Lee - International Conference on the Theory and …, 2002 - Springer
The braid group with its conjugacy problem is one of the recent hot issues in cryptography.
At CT-RSA 2001, Anshel, Anshel, Fisher, and Goldfeld proposed a commutator key …
At CT-RSA 2001, Anshel, Anshel, Fisher, and Goldfeld proposed a commutator key …