Article ID Journal Published Year Pages File Type
4662071 Annals of Pure and Applied Logic 2010 7 Pages PDF
Abstract

We propose a couple of general ways of constructing authentication schemes from actions of a semigroup on a set, without exploiting any specific algebraic properties of the set acted upon. Then we give several concrete realizations of this general idea, and in particular, we describe several authentication schemes with long-term private keys where forgery (a.k.a. impersonation) is NP-hard. Computationally hard problems that can be employed in these realizations include the Graph Colorability problem, the Diophantine problem, and many others.

Related Topics
Physical Sciences and Engineering Mathematics Logic