Computational Group Theory and Quantum-Era Cryptography
DOI:
https://doi.org/10.32628/IJSRSET2310556Keywords:
Computational Group theory, Lattice, Cryptography, Quantum computers, Encryption, Decryption, Polycyclic groupAbstract
This paper provides an overview of the significant role of computational group theory in cryptography. Group theory plays a crucial role in various cryptographic applications, such as key exchange, encryption, and digital signatures. This paper examines the fundamental concepts, algorithms, and applications of computational group theory in cryptography, using polycyclic groups with a focus on key findings and recent developments in quantum-era cryptography.
References
- Fraleigh, J. B. (2003). A First Course in Abstract Algebra. Pearson.
- Shoup, V. (1996). Lower bounds for discrete logarithms and related problems. Advances in Cryptology - CRYPTO '96.
- Diffie, W., & Hellman, M. E. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory.
- Koblitz, N. (1987). Elliptic Curve Cryptosystems. Mathematics of Computation.
- Peikert, C. (2016). Lattice Cryptography for the Internet. arXiv:1612.00988.
- Pollard, J. M. (1978). Monte Carlo Methods for Index Computation (Mod p). Mathematics of Computation.
- Schoof, R. (1995). Counting Points on Elliptic Curves over Finite Fields. Journal of the London Mathematical Society.
- Bernstein, D. J., Lange, T., & Schwabe, P. (2016). Post-Quantum Cryptography. Springer.
- Brakerski, Z., & Vaikuntanathan, V. (2014). Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. Advances in Cryptology - CRYPTO '11.
- Michael N. John & Udoaka O. G (2023). Algorithm and Cube-Lattice-Based Cryptography. International journal of Research Publication and reviews, Vol 4, no 10, pp 3312-3315 October 2023.
- Groth, J., Sahai, A., & Waters, B. (2008). Pairing-Based Cryptography: A Survey. Advances in Cryptology - EUROCRYPT '08, 2-16.
- Ajtai, M. (1996). Public-Key Cryptosystems from Lattice Reduction Problems. STOC '96, 99-108.
- Goldwasser, S., & Rackoff, C. (1989). A Group Theoretic Framework for Cryptographic Applications. Advances in Cryptology - CRYPTO '85, 368-383.
- Alagiannis, I., et al. "Lattice-based cryptography as a Post-Quantum candidate." Journal of Cryptographic Engineering (2014)
- Derek F. Holt, Handbook of Computational Group theory. In the series ‘Discrete Mathematics and its Application’,Chapman & Hall/CRC 2005, xvi + 514 p.
- Udoaka O. G. & Frank E. A. (2022). Finite Semi-group Modulo and Its Application to Symmetric Cryptography, International Journal of Pure Mathematics DOI: 10.46300/91019.2022.9.13.
- Udoaka, O. G. (2022). Generators and inner automorphism. THE COLLOQUIUM -A Multi-disciplinary Thematc Policy Journal www.ccsonlinejournals.com. Volume 10, Number 1 , Pages 102 -111 CC-BY-NC-SA 4.0 International Print ISSN : 2971-6624 eISSN: 2971-6632
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.