Cryptanalysis of matrix conjugation schemes

In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a public key cryptosystem due to Wang, Wang, Cao, Okamoto and Shao. Both of these protocols use the computational hardness of some variations of the conjugacy search problem in a class of noncommutative...

Full description

Bibliographic Details
Main Authors: Myasnikov Alex D., Ushakov Alexander
Format: Article
Language:English
Published: De Gruyter 2014-06-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2012-0033