Analysis of secret sharing schemes based on Nielsen transformations | Библиотека Института психологии РАН

Библиотека Института психологии РАН

Analysis of secret sharing schemes based on Nielsen transformations

Kotov Matvei, Panteleev Dmitry, Ushakov Alexander
Groups, Complexity, Cryptology SCOPUS WOS
ТИП ПУБЛИКАЦИИ статья в журнале - научная статья
ГОД 2018
ЯЗЫК EN
АННОТАЦИЯ
We investigate security properties of two secret-sharing protocols proposed by Fine, Moldenhauer, and Rosenberger in Sections 4 and 5 of [B. Fine, A. Moldenhauer and G. Rosenberger, Cryptographic protocols based on Nielsen transformations, J. Comput. Comm. 4 2016, 63–107] (Protocols I and II resp.). For both protocols, we consider a one missing share challenge. We show that Protocol I can be reduced to a system of polynomial equations and (for most randomly generated instances) solved by the computer algebra system Singular. Protocol II is approached using the technique of Stallings' graphs. We show that knowledge of m−1 shares reduces the space of possible values of a secret to a set of polynomial size.
ЦИТАТА
Kotov, M. Analysis of secret sharing schemes based on Nielsen transformations / M. Kotov, D. Panteleev, A. Ushakov // Groups, Complexity, Cryptology. – 2018. – Т. 10. – № 1. – P. 1-8
АВТОРЫ

Ушаков Дмитрий Викторович

ЛАБОРАТОРИЯ ПСИХОЛОГИИ И ПСИХОФИЗИОЛОГИИ ТВОРЧЕСТВА
Директор Интситута психологии РАН, заведующий лабораторией

Публикаций в поиске

297
ИНТЕЛЛЕКТ ПСИХОЛОГИЯ INTELLIGENCE
ПОХОЖИЕ ПУБЛИКАЦИИ