Cryptology ePrint Archive: Report 2010/470
Two identification protocols based on Cayley graphs of Coxeter groups
Feli\'u Sagols and Guillermo Morales-Luna
Abstract: A challenge-response identification protocol is introduced, based on the intractability of the word problem in some Coxeter groups. A Prover builds his public key as the set of leaves of a tree in the Cayley graph of a Coxeter group, and the tree itself is his private keys. Any challenge posed by a Verifier consists of a subset of the public key, and the Prover shows his knowledge of the private key by providing a subtree having as set of leaves the challenge set. Any third party aiming to impersonate the Prover faces a form of the word problem in the Coxeter group. Although this protocol maintains the secrecy of the whole private key, it is disclosing some parts of it. A second protocol is introduced which is indeed a transcription of the already classical zero-knowledge protocol to recognize pairs of isomorphic graphs.
Category / Keywords: Authentication, Coxeter groups, identification protocols, random spanning trees, word problem
Date: received 3 Sep 2010, last revised 27 Jan 2011
Contact author: gmorales at cs cinvestav mx
Available format(s): PDF | BibTeX Citation
Note: A flaw has been corrected. It is necessary to fix a threshold for the lengths of the responses to the challenges.
Version: 20110127:122818 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]