An overview of trace based public key cryptography over finite fields

  • Authors:
  • Ersan Akyıldız;Muhammad Ashraf

  • Affiliations:
  • -;-

  • Venue:
  • Journal of Computational and Applied Mathematics
  • Year:
  • 2014

Quantified Score

Hi-index 7.29

Visualization

Abstract

The Discrete Log Problem (DLP), that is computing x, given y=@a^x and =G@?F"q^*, based Public Key Cryptosystem (PKC) have been studied since the late 1970's. Such development of PKC was possible because of the trapdoor function f:Z"@?-G=@?F"q^*, f(m)=@a^m is a group homomorphism. Due to this fact we have; Diffie Hellman (DH) type key exchange, ElGamal type message encryption, and Nyberg-Rueppel type digital signature protocols. The cryptosystems based on the trapdoor f(m)=@a^m are well understood and complete. However, there is another trapdoor function f:Z"@?-G, f(m)-Tr(@a^m), where G=@?F"q"^"k^*,k=2, which needs more attention from researchers from a cryptographic protocols point of view. In the above mentioned case, although f is computable, it is not clear how to produce protocols such as Diffie Hellman type key exchange, ElGamal type message encryption, and Nyberg-Rueppel type digital signature algorithm, in general. It would be better, of course if we can find a more efficient algorithm than repeated squaring and trace to compute f(m)=Tr(@a^m) together with these protocols. In the literature we see some works for a more efficient algorithm to compute f(m)=Tr(@a^m) and not wondering about the protocols. We also see some works dealing with an efficient algorithm to compute Tr(@a^m) as well as discussing the cryptographic protocols. In this review paper, we are going to discuss the state of art on the subject.