Atıf İçin Kopyala
AKYILDIZ E. , Ashraf M.
JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, cilt.259, ss.599621, 2014 (SCI İndekslerine Giren Dergi)

Yayın Türü:
Makale / Tam Makale

Cilt numarası:
259

Basım Tarihi:
2014

Doi Numarası:
10.1016/j.cam.2013.10.022

Dergi Adı:
JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS

Sayfa Sayıları:
ss.599621
Özet
The Discrete Log Problem (DLP), that is computing x, given y = alpha(x) and (alpha) = G subset of Fq*, based Public Key Cryptosystem (PKC) have been studied since the late 1970's. Such development of PKC was possible because of the trapdoor function! : Z(l) > G = (alpha) subset of Fq*, f (m) = alpha(m) is a group homomorphism. Due to this fact we have; Diffie Hellman (DH) type key exchange, EIGamal type message encryption, and NybergRueppel type digital signature protocols. The cryptosystems based on the trapdoor f (m) = am are well understood and complete. However, there is another trapdoor function f : Z(l) > G, f (m) > Tr(alpha(m)), where G = subset of Fqk* k >= 2, which needs more attention from researchers from a cryptographic tographic protocols point of view. In the above mentioned case, although f is computable, it is not clear how to produce protocols such as Diffie Hellman type key exchange, EIGamal type message encryption, and NybergRueppel type digital signature algorithm, in general. It would be better, of course if we can find a more efficient algorithm than repeated squaring and trace to compute f (m) = Tr(am) together with these protocols. In the literature we see some works for a more efficient algorithm to compute f (m) = Tr(am) and not wondering about the protocols. We also see some works dealing with an efficient algorithm to compute Tr(am) as well as discussing the cryptographic protocols. In this review paper, we are going to discuss the state of art on the subject. (C) 2013 Elsevier B.V. All rights reserved.