Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014, Article ID 630607, 10 pages
http://dx.doi.org/10.1155/2014/630607
Research Article

Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography

Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China

Received 2 February 2014; Accepted 6 April 2014; Published 28 April 2014

Academic Editor: Javier Oliver

Copyright © 2014 Lize Gu and Shihui Zheng. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [8 citations]

The following is the list of published articles that have cited the current article.

  • Jing Li, Licheng Wang, Zonghua Zhang, and Xinxin Niu, “Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family,” Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16, pp. 895–900, . View at Publisher · View at Google Scholar
  • Matthew Tamayo, “Algebraic full homomorphic encryption and resisting Gröbner basis cryptanalysis,” ACM Communications in Computer Algebra, vol. 49, no. 2, pp. 63–63, 2015. View at Publisher · View at Google Scholar
  • Huanguo Zhang, Houzhen Wang, Shaowu Mao, Jinhui Liu, Aiwan Fan, and Jianwei Jia, “Cryptanalysis of public key cryptosystems based on non-Abelian factorization problems,” Tsinghua Science and Technology, vol. 21, no. 3, pp. 344–351, 2016. View at Publisher · View at Google Scholar
  • Jianwei Jia, Jinhui Liu, and Huanguo Zhang, “Cryptanalysis of cryptosystems based on general linear group,” China Communications, vol. 13, no. 6, pp. 217–224, 2016. View at Publisher · View at Google Scholar
  • Jinhui Liu, Huanguo Zhang, Jianwei Jia, Houzhen Wang, Shaowu Mao, and Wanqing Wu, “Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem,” Science China-Information Sciences, vol. 59, no. 5, 2016. View at Publisher · View at Google Scholar
  • Houzhen Wang, Huanguo Zhang, and Shaohua Tang, “Key recovery on several matrix public-key encryption schemes,” Iet Information Security, vol. 10, no. 3, pp. 152–155, 2016. View at Publisher · View at Google Scholar
  • Licheng Wang, Jing Li, Jianhua Yan, and Zhiguo Qu, “An efficient proxy re-encryption based on (Semi) group factorization problems,” Proceedings - 2016 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2016, pp. 199–202, 2016. View at Publisher · View at Google Scholar
  • Jinhui Liu, Huanguo Zhang, and Jianwei Jia, “Cryptanalysis of schemes based on polynomial symmetrical decomposition,” Chinese Journal of Electronics, vol. 26, no. 6, pp. 1139–1146, 2017. View at Publisher · View at Google Scholar