Generalized π-Armendariz Authentication Cryptosystem
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33104
Generalized π-Armendariz Authentication Cryptosystem

Authors: Areej M. Abduldaim, Nadia M. G. Al-Saidi

Abstract:

Algebra is one of the important fields of mathematics. It concerns with the study and manipulation of mathematical symbols. It also concerns with the study of abstractions such as groups, rings, and fields. Due to the development of these abstractions, it is extended to consider other structures, such as vectors, matrices, and polynomials, which are non-numerical objects. Computer algebra is the implementation of algebraic methods as algorithms and computer programs. Recently, many algebraic cryptosystem protocols are based on non-commutative algebraic structures, such as authentication, key exchange, and encryption-decryption processes are adopted. Cryptography is the science that aimed at sending the information through public channels in such a way that only an authorized recipient can read it. Ring theory is the most attractive category of algebra in the area of cryptography. In this paper, we employ the algebraic structure called skew -Armendariz rings to design a neoteric algorithm for zero knowledge proof. The proposed protocol is established and illustrated through numerical example, and its soundness and completeness are proved.

Keywords: Cryptosystem, identification, skew π-Armendariz rings, skew polynomial rings, zero knowledge protocol.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1132383

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 796

References:


[1] S. Goldwasser, S. Micali, and C.Rckoff, “The knowledge complexity of interactive proof systems,” SIAM Journal of Computing, vol. 18, pp.186-208, 1989.
[2] N. T. Courtois, “Efficient zero-knowledge authentication based on a linear algebra problem minrank,” Asiacrypt 2001, vol. 22, no. 48, pp. 402-411, 2001.
[3] C. Wolf, “Zero-knowledge and multivariate quadratic equations,” Workshop on Coding and Cryptography, 2004.
[4] M. R. Valluri, “Authentication schemes using polynomials over non-commutative rings,” International Journal on Cryptography and Information Security, vol.2, no.4, 51-58, 2012
[5] E. Armendariz, “A note on extensions of baer and p.p. –rings”, Journal of Austral. Math. Soc, vol.18, pp: 470-473, 1974.
[6] M.B. Rege and S. Chhawchharia, “Armendariz rings”, Proc. Japan Acad. (Ser. A), vol.73, pp: 14-17, 1997.
[7] C. Y. Hong, N. K. Kim and T. K. Kwak, “On skew armendariz rings,” Communications in Algebra, vol. 31, no. 1, pp: 103-122, 2003.
[8] O. Lunqun_, L. Jinwang and X. Yueming, “Ore extensions of skew π -Armendariz rings”, Bulletin of the Iranian Mathematical Society vol. 39 no. 2, pp 355-368, 2013.
[9] A. M. Abduldaim and S. Chen, “α-skew π-McCoy rings”, J. App. Math., vol.2013, (Article ID 309392), 7 pages, 2013.
[10] A. M. Abduldaim and A. M. Ajaj, “A New Paradigm of the Zero-Knowledge Authentication Protocol Based π-Armendariz Rings,” in Proc. IEEE International Conference on New Trends in Information & Communications Technology Applications, Baghdad, 2017, pp 112-117.
[11] A. M. Abduldaim, “Weak Armendariz Zero Knowledge Cryptosystem,” Journal of Al-Qadisiyah for Computer Science and Mathematics, vol. 9, no. 2, pp. 1-6, 2017.
[12] A. M. Abduldaim and R. M. Abidali, “π-Armendariz Rings and Related Concepts,” Baghdad Science Journal, vol. 13, no. 4, pp. 853-861, 2016.
[13] A. M. Abduldaim and A. M. Ajaj, “Examples of α-Skew π-Armendariz Rings,” Iraqi Journal of Science (Baghdad University), vol. 58, no. 1C, pp. 482-489, 2017.
[14]O. Goldreich and Y. Oren, “Definitions and properties of zero-knowledge proof systems,” Journal of Cryptology, vol. 7, no. 1, pp. 1-32, 1994.
[15] A. Piva, “On the integration between digital watermarking and cryptography,” European Association for Signal Processing (EURASIP) NewsLetter, vol. 16, no. 4, pp. 2-14, 2005.