A verifiable secret shuffe of homomorphic encryptions

J Groth - International Workshop on Public Key Cryptography, 2002 - Springer
We show how to prove in honest verifier zero-knowledge the correctness of a shuffe of
homomorphic encryptions (or homomorphic commitments.) A shuffe consists in a …

Thompson's group and public key cryptography

V Shpilrain, A Ushakov - … Third International Conference, ACNS 2005, New …, 2005 - Springer
Recently, several public key exchange protocols based on symbolic computation in non-
commutative (semi) groups were proposed as a more efficient alternative to well established …

Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography

B Tsaban - Journal of Cryptology, 2015 - Springer
We introduce the linear centralizer method, and use it to devise a provable polynomial-time
solution of the Commutator Key Exchange Problem, the computational problem on which, in …

The conjugacy search problem in public key cryptography: unnecessary and insufficient

V Shpilrain, A Ushakov - Applicable Algebra in Engineering …, 2006 - Springer
The conjugacy search problem in a group G is the problem of recovering an x ∈ G from
given g ∈ G and h= x− 1 gx. This problem is in the core of several recently suggested public …

A practical attack on some braid group based cryptographic primitives

D Hofheinz, R Steinwandt - International workshop on public key …, 2002 - Springer
A simple heuristic approach to the conjugacy problem in braid groups is described. Although
it does not provide a general solution to the latter problem, it demonstrates that various …

A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem

JH Cheon, B Jun - Advances in Cryptology-CRYPTO 2003: 23rd Annual …, 2003 - Springer
We propose the first polynomial time algorithm for the braid Diffie-Hellman conjugacy
problem (DHCP) on which the braid key exchange scheme and the braid encryption scheme …

New signature scheme using conjugacy problem

KH Ko, DH Choi, MS Cho, JW Lee - Cryptology ePrint Archive, 2002 - eprint.iacr.org
We propose a new digital signature scheme based on a non-commutative group where the
conjugacy search problem is hard and the conjugacy decision problem is feasible. We …

Cryptanalysis via algebraic spans

A Ben-Zvi, A Kalka, B Tsaban - … in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
We introduce a method for obtaining provable polynomial time solutions of problems in
nonabelian algebraic cryptography. This method is widely applicable, easier to apply, and …

A new key exchange protocol based on the decomposition problem

V Shpilrain, A Ushakov - arxiv preprint math/0512140, 2005 - arxiv.org
In this paper we present a new key establishment protocol based on the decomposition
problem in non-commutative groups which is: given two elements $ w, w_1 $ of the platform …

Potential weaknesses of the commutator key agreement protocol based on braid groups

SJ Lee, E Lee - International Conference on the Theory and …, 2002 - Springer
The braid group with its conjugacy problem is one of the recent hot issues in cryptography.
At CT-RSA 2001, Anshel, Anshel, Fisher, and Goldfeld proposed a commutator key …